Infrastructure Security Policy

1. Introduction

PagerTree is committed to ensuring the confidentiality, integrity, and availability of the systems and infrastructure that support our platform. This Infrastructure Security Policy outlines the controls and safeguards PagerTree uses to protect production environments, cloud resources, and supporting systems from unauthorized access, misuse, or disruption.

2. Scope

This policy applies to:

  • All cloud infrastructure, servers, containers, networks, and supporting services used to operate PagerTree systems
  • All employees, contractors, and approved third parties with access to production environments
  • All infrastructure-as-code, deployment pipelines, configuration management, and operational tooling

This policy does not cover end-user devices or endpoint security, which are addressed in separate policies.


3. Cloud Infrastructure Security

3.1 Hosting Environment

PagerTree hosts its primary infrastructure in regions provided by Fly.io. These environments include:

  • Secure physical data centers with restricted access
  • Redundant networking and compute resources
  • Environmental protections for power, cooling, and fire prevention
  • Compliance with industry standards such as SOC 2 Type I

3.2 Network Controls

PagerTree employs multiple layers of network protection:

  • Firewall rules and security groups restricting inbound and outbound traffic
  • Enforced TLS for all communication paths
  • Segmentation of environments (production, staging, development)
  • Use of private networking where supported by cloud providers
  • Denial of direct public access unless explicitly required

3.3 System Hardening

All infrastructure components—including virtual machines, containers, and supporting systems—are hardened using:

  • Minimal-privilege configurations
  • Latest stable OS distributions
  • Removal of unnecessary services and packages
  • Secure baseline images and reproducible build processes
  • Regular security patching and updates

4. Access Control & Authentication

4.1 Least Privilege

Access to infrastructure is granted only to authorized individuals who require it to perform their job responsibilities.

4.2 Authentication Requirements

  • Multi-factor authentication (MFA) is required for all administrative access
  • Secure protocols (e.g., SSH with strong keys, SSO-enabled consoles)
  • No shared administrative accounts
  • Role-based access enforced across all systems

4.3 Logging Access

Infrastructure access activity is logged and monitored, including:

  • SSH sessions
  • Console logins
  • API and administrative actions
  • Privilege elevation events

5. Configuration & Change Management

5.1 Infrastructure-as-Code (IaC)

PagerTree manages infrastructure through IaC principles when technically feasible, ensuring:

  • Version-controlled configurations
  • Peer review of infrastructure changes
  • Reproducible deployments

5.2 Controlled Changes

Changes to production systems follow formal procedures:

  • Documentation of intended modifications
  • Review and approval prior to deployment
  • Testing in non-production environments
  • Logging and auditability of each change

6. Monitoring & Alerting

PagerTree continuously monitors its infrastructure to detect anomalies or security issues. Monitoring includes:

  • System resource utilization
  • Network traffic patterns
  • Application health indicators
  • Security events and suspicious behavior
  • Failed login attempts and privilege escalations

Alerting systems notify the PagerTree team of abnormal conditions, allowing rapid response.


7. Data Protection

7.1 Encryption in Transit & At Rest

  • All data transmitted between clients and PagerTree services is encrypted using TLS
  • Data stored within production databases, storage services, and backups is encrypted at rest

7.2 Backup Controls

  • Encrypted backups stored in geographically diverse regions
  • Regular validation of backup integrity
  • Rolling backup retention in accordance with PagerTree’s Data Retention Policy

8. Resilience & Redundancy

PagerTree infrastructure is designed with resilience in mind, including:

  • Redundant compute nodes
  • Multi-zone or multi-region capabilities where supported
  • Automated failover and recovery mechanisms
  • Use of stateless application patterns where possible

These resiliency controls reduce downtime and improve availability.


9. Third-Party Dependencies

PagerTree evaluates third-party cloud services and infrastructure providers based on:

  • Security practices and certifications
  • Reliability and uptime performance
  • Risk assessments and vendor reviews
  • Compliance requirements

Vendors must meet PagerTree’s minimum security standards before adoption.


10. Enforcement

Failure to comply with this policy may result in:

  • Revocation of infrastructure access
  • Disciplinary action for employees or contractors
  • Termination of third-party access or contracts

11. Review and Maintenance

This Infrastructure Security Policy is reviewed at least annually or upon significant changes to PagerTree’s infrastructure, cloud environment, or security requirements. Updates require approval from PagerTree Executive Management.