Hazy's system is secure by design and integrates as many security focussed features and practices as possible to ensure the secure, safe and reliable running of Hazy's software within its customers infrastructure.
Hazy's product is provided as software, not as a service, so although Hazy aims to provide the most secure software possible, the actual security of an installation is dependent on its environment and configuration.
These pages aim to provide a guide to securing and monitoring Hazy's software on your systems.
All components of the Hazy platform are designed for secure operation within the most sensitive customer environment, the following pages go into the details of how Hazy embeds security processes within its develoment process and how customers can configure their deployment for maximum safety.
- Hub installation
- Synthesiser Installation
- Hub audit log