ICA.CORP
Legal

Security Policy

Last updated: March 1, 2026

1. Security Commitment

ICA Corp is committed to maintaining the highest level of security for our clients, partners, and stakeholders. With 50 years of experience in enterprise security, we implement defense-in-depth strategies that protect against evolving cyber threats while ensuring business continuity.

2. Certifications & Standards

  • + ISO 27001 Information Security Management certified
  • + SOC 2 Type II compliant
  • + GDPR, HIPAA, and PCI-DSS compliance expertise
  • + AWS Advanced Consulting Partner
  • + Microsoft Gold Partner

3. Infrastructure Security

Our infrastructure employs multi-layered security controls including network segmentation, intrusion detection and prevention systems (IDS/IPS), web application firewalls (WAF), and continuous monitoring through our 24/7 Security Operations Center (SOC). All systems are routinely patched and updated according to our vulnerability management program.

4. Data Encryption

All data in transit is protected using TLS 1.3. Data at rest is encrypted using AES-256. Database backups are encrypted and stored in geographically distributed locations. Encryption keys are managed through hardware security modules (HSMs) with strict access controls.

5. Access Control

We implement zero-trust architecture with identity and access management (IAM) across all systems. Multi-factor authentication (MFA) is mandatory for all employees. Access is granted on a principle-of-least-privilege basis with regular access reviews and automated de-provisioning.

6. Incident Response

Our incident response team maintains a comprehensive response plan with defined escalation procedures. We conduct regular tabletop exercises and simulations to ensure readiness. In the event of a security incident, affected parties are notified within 72 hours in accordance with applicable regulations.

7. Employee Security

All employees undergo background checks and sign confidentiality agreements. Security awareness training is mandatory and conducted quarterly. Access to client data is restricted to authorized personnel with a legitimate business need.

8. Vulnerability Reporting

If you discover a security vulnerability, please report it responsibly to [email protected]. We acknowledge all reports within 24 hours and are committed to addressing verified vulnerabilities promptly.