A leadership-driven security program built to safeguard your most critical data.
At Interloc, security isn’t an afterthought, it’s part of our DNA. We believe that protecting our customers’ data begins at the very top, which is why our security program is driven by senior leadership and embedded into every business decision we make. This top-down approach ensures that information security isn’t just an IT initiative, it’s a strategic business imperative.
Interloc uses ISO/IEC 27001 as the international benchmark for implementing and maintaining a rigorous Information Security Management System (ISMS), demonstrating through formal audits that our controls meet global standards and providing customers with verified assurance that their data is protected.
Interloc applies ISO/IEC 27017 to enhance our cloud security program with cloud-specific controls that extend ISO 27001/27002, ensuring secure virtual environments, strong asset management practices, clear shared responsibility, and comprehensive protection of customer data across all cloud operations.
Interloc maintains SOC 2 compliance, an AICPA auditing framework that validates our controls for securely managing customer data across the Trust Services Criteria—Security, Availability, Processing Integrity, Confidentiality, and Privacy—through independent audits that demonstrate our ongoing commitment to protecting client information.
FedRAMP provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by U.S. federal agencies. Interloc aligns its security practices with FedRAMP principles to support federal requirements, strengthen cloud security controls, and ensure our solutions meet the high bar expected for government environments.
Interloc performs ongoing vulnerability scanning, security audits, and continuous monitoring to identify weaknesses before they become threats. These proactive measures help us maintain a strong and adaptive security posture.
All changes to our IT infrastructure follow a disciplined and formal review process to prevent unintended impacts on system security. Senior oversight ensures every update preserves confidentiality, integrity, and availability.
Interloc ensures every system modification aligns with strict security, operational, and standards-based requirements. Our change compliance process evaluates each update for potential risk, validates alignment with established controls, and ensures that confidentiality, integrity, and availability are protected throughout the change lifecycle. This disciplined approach maintains system stability while supporting secure and continuous improvement.
FedRAMP provides a standardized approach
to security assessment, authorization, and continuous monitoring for cloud products and services used by U.S. federal agencies. Interloc aligns its security practices with FedRAMP principles to support federal requirements, strengthen cloud security controls, and ensure our solutions meet the high bar expected for government environments.
Confidentiality: Interloc protects sensitive customer and system data through strict access controls, encryption practices, and a security-first culture that ensures information is only available to authorized users.
Integrity: We maintain data accuracy and consistency across all environments by enforcing robust change controls, validation processes, and continuous monitoring to prevent unauthorized modification or corruption.
Availability: Interloc designs its systems, infrastructure, and support processes to ensure reliable, uninterrupted access to critical applications and information, enabling customers to operate with confidence and minimal downtime.
Understanding Interloc’s Security Approach.
All systems and solutions hosted or owned by Interloc Solutions are subject to ISO 27001/27017. User access is granted based on job role and access necessary. Access is reviewed and evaluated on at least quarterly basis. Least privilege design principles are applied to all accounts within Interloc’s control. This ensures that only the necessary number of permissions are provided to human, system accounts, and systems.
Training is conducted via KnowBe4. Training is based on roles, employee access to certain systems, and data classification levels, i.e., training for a financial officer will differ from that of an employee who develops applications. All users are subject to industry-standard training, passwords, cyber hygiene, insider threats, ethics, phishing, etc. Training is mandated and occurs at least annually.
All configuration baselines are measured and scanned by our compliance and policy appliance. Scans occur weekly to ensure that systems are within the baseline configurations. Reports are reviewed weekly for any gaps. All changes that affect security or operational integrity are subject to our Change Control Board.
We maintain system availability through proactive monitoring, rigorous change control, and continuous vulnerability and performance management to identify and resolve issues before they impact operations. In the event of unexpected disruptions, our incident response procedures and resilient architecture ensure rapid recovery and minimal interruption for our customers.
Security assessments of Interloc's implemented controls and standards are conducted at least annually. Should an assessment be conducted by a 3rd party resource, results can be made available to customers. Internal reviews and their associated results are not made available.
Getting in touch with us will improve your business tremendously. You can expect to hear from us shortly