View Categories

Security Considerations

2 min read

At MikroTik SD-WAN, security is a core value embedded in every stage of our platform’s design, deployment, and operations. This section outlines the strategic measures we take to protect our platform, website, and the data entrusted to us by our clients.


1. Security by Design #

Our platform is developed following a Secure Development Lifecycle (SDLC), ensuring that security requirements are integrated from the initial architecture phase through to deployment and ongoing maintenance.


2. Data Protection #

  • All sensitive information is encrypted during transmission and while stored, using strong and industry-recognized cryptographic standards.
  • Access to personal and operational data is granted strictly on a least privilege basis.
  • Data residency complies with applicable privacy regulations, including LGPD and GDPR.

3. Access Control and Authentication #

  • Multi-factor authentication (MFA) is required for all administrative accounts.
  • Role-Based Access Control (RBAC) ensures users access only what is necessary for their role.
  • Access logs are maintained and continuously monitored for suspicious activity.

4. Infrastructure Security #

  • Hosted in secure data centers certified with ISO 27001, SOC 1 Type II, and SOC 2 Type II.
  • Network segmentation and advanced firewalling isolate critical services from public networks.
  • Regular vulnerability assessments and penetration testing are performed, supplemented by independent third-party security audits.

5. Monitoring and Incident Response #

  • Continuous, 24/7 monitoring of platform health, performance, and security events.
  • Automated alerting and anomaly detection to identify potential threats in real time.
  • A structured incident response plan governs threat detection, containment, investigation, and notification procedures.

6. Business Continuity and Disaster Recovery #

  • Redundant systems and geographically diverse backups reduce downtime risk.
  • Disaster recovery processes are periodically tested to meet service restoration objectives.

7. Continuous Security Improvement #

We maintain a proactive approach to enhancing our security posture by:

  • Keeping systems and dependencies up to date
  • Promptly applying security patches
  • Incorporating lessons learned from audits, security tests, and industry best practices

📧 Security Contact: For security-related inquiries or to report a vulnerability, please email support@mikrotiksdwan.com
🌐 Documentation: https://mikrotiksdwan.com/docs