- Use Cases
Blueprint only operates in industry-standard data centers that are SOC II Type 2 and ISO 27001 compliant.
Data center access is highly restricted and granted only to authorized personnel using multi-factor and multi-stage authentication.
Data center compliance documentation for our cloud partners can be found below:Amazon Web Services | Rackspace
Request Support - Customers can log incidents or service requests 24/7, 365 days a year via the Blueprint Community Support Portal.
Response Time - Initial response and incident assignment will take place within two hours for Severity 1 incidents related to service availability and normal service operation.
Service Availability - Blueprint Cloud provides a monthly 99.5% uptime SLA.
For more details on our support terms, please click here.
Customers are provided with a dedicated, HTTPS-only website ensuring data security best practices.
Encryption in transit is provided using industry-standard TLS 1.1 or 1.2 protocols.
User access and authentication are handled via the built-in secure authentication system.
Customers can customize exactly what actions their users and administrators are allowed to perform by leveraging granular role-based access controls.
Single Sign-On — Customers can securely log in with their own user authentication systems by leveraging SAML 2.0. Blueprint products support both SP and IdP initiation and have been verified to work with ADFS 2.0.
Customers are provisioned with their own dedicated SQL databases to store all solution data and ensure data segregation.
Customer databases are encrypted at rest on disk using strong AES-256 encryption.
Blueprint completes comprehensive, regularly scheduled, independent, full-stack penetration testing.
Security updates are applied to Blueprint Cloud servers on a monthly basis.
Host-based intrusion detection and prevention (IDS/IPS) technologies are used to monitor and defend against intrusion attempts.
Security events are logged to a centralized event management service for alerting and analysis