AiVRIC User Guide
Security policy

Network Security

Protects AiVRIC networks through segmentation, monitoring, and secure connectivity.

Applies to AiVRIC workforce, partners, and subprocessors Trust Center Acceptable use

Purpose & scope

This policy guides how AiVRIC designs, operates, and validates Network Security across production, corporate, and partner environments.

It applies to employees, contractors, vendors, and any system interacting with AiVRIC data or services.

Key controls

  • Segment networks by sensitivity; isolate production from corporate and guest.
  • Use encrypted channels (VPN/TLS) for administrative access.
  • Deploy intrusion detection/prevention and flow monitoring.
  • Harden ingress/egress with allowlists and rate limiting.

Operating procedures

  • Review firewall/security group rules monthly for least privilege.
  • Log and investigate anomalous traffic and blocked attempts.
  • Test DDoS protections and failover paths periodically.

Evidence & ownership

Owner: Security & Compliance. Review cadence: annually or after material changes.

Evidence: Collected via AiVRIC audit logs, ticketing systems, monitoring dashboards, and vendor records as appropriate to this policy area.

Contact: [email protected]