Maximum Security
Great Responsibility
Manor is the backbone in our users operations. With great responsibilities comes trust, and we have always taken this challenge very seriously. Manor's security requirements are extensive at all levels, from a brainstorm to fully operational features, from design to implementation, from programming to testing and throughout all of our operations - security is key.
Instance SEPARATION
One of the things that sets Manor apart from nearly all other software systems is that Manor divides its infrastructure based on clients and utilizes fundamental access controls in the server operating systems for this purpose. Each company is isolated to ensure maximum separation between customers.
This means that any kind of disruption at one client cannot affect the next one.
Encryption
Manor uses TLS (Transport Layer Security) for secure communication, which provides secure channels for users protected by 256-bit AES encryption. Users can identify this approach by the fact that all Manor web addresses start with the "https" prefix, indicating that the communication is encrypted.
All your communications with Manor are encrypted and digitally signed with a 2,048-bit key. Manor employs the same level of security as banks use for online transactions.
Infrastructure
Manor operates in AWS data centers, which are the same facilities and services used by the most demanding clients worldwide, whether they are stock markets, airlines, or others who need to ensure near 100% uptime of their systems.
AWS Certifications
Manor operates in a digital environment provided by AWS, which has been specifically chosen for its security and quality. AWS has numerous certifications, including full compliance with ISO 27001 and PCI standards for data centers and all related infrastructure.
IRS certification
Manor handles accounting for a multitude of customers and complies with laws and regulations regarding the design and implementation of digital accounting systems. Manor is therefore listed by the Icelandic Tax Authorities as a provider of digital accounting systems that have passed the declaration and design requirements of their systems.
User-centric Security
Two-factor authentication
Manor offers users who seek enhanced security the option to connect using both a password and a unique security code sent to their mobile device. This means that anyone attempting unauthorized access to Manor would need to possess the user's email address, password, and their mobile device in order to succeed. Two-factor authentication is the same approach used by online banking systems for login purposes.
Single Sign-On
Manor also supports Single Sign-On (SSO), which is suitable for larger entities and users in a managed IT environment. In this case, once the user has logged into their managed workstation, for example, Manor relies on the authenticated environment for their Manor login.
Password Strength Assessment
Manor only accepts passwords that pass a strength assessment. This is done in such a way that when a user chooses a password, they receive real-time feedback on the strength of the password, and they can only save a new password if it is considered "very strong" according to the system's evaluation. This approach has several advantages over traditional password rules and is considered more secure.
Security by Design
Manor is designed with security as a guiding principle. This means that Manor places emphasis on security requirements, even if it affects the user experience or workflow when necessary. This approach is implemented at all stages, from system design to service delivery.
Login Protection
Manor closely monitors the frequency of login attempts made by users. If there are too many attempts that seem beyond normal user behavior, the respective computer is locked out, preventing further attempts. This measure is in place to prevent automated attempts to guess user passwords. Manor's approach to login protection is standardized and recognized.
Access Controls
Role-Based Access Control
Manor utilizes recognized methods for access control and uses so-called role-based approach to permissions management. With this approach, it becomes easy to manage permissions, understand their impact on the system as a whole, and makes their effects on specific components of the system almost self explanatory.
Simple roles
Managing roles is a straightforward task for those responsible for user management in Manor. Users can create their own roles and select the specific permissions that apply to them. All permissions are described in a clear and understandable language, making it easy to comprehend their meaning.
This is a key aspect of security that ensures that permissions are not inadvertently granted beyond what is intended.
Single Sign-on (SSO)
Manor styður við svonefnda einskráningu (e. single sign-on) sem er vinsæl leið hjá stærri fyrirtækjum eða stofnunum til þess að auðkenna starfsmenn sína inn í hin ýmsu kerfi.
Multi-Factor Authentication at all levels
There is a requirement for multi-factor authentication at all levels of Manor. This applies to both users accessing the system and system administrators accessing the network servers.
Quality Assurance and Testing
Testing
All software developed by Manor undergoes testing throughout the traditional development process, including both automated and manual testing, before it is deployed to customers.
Uptime monitoring
Manor hosts its data on a direct fiber optic connection to the country's main network infrastructure. The achievable uptime of Manor is maximized and measured to reach as close to 100% accessibility as possible. Uptime monitoring and reporting are handled by the US-based network company Pingdom.
Error monitoring
Real-time monitoring is in place for any errors that users may encounter in their UI or in any underlying systems. Errors trigger a process within Manor's development team to identify and fix them in accordance with the development and testing workflow. Errors that affect daily operations of our users are corrected within the day.
Secure Code Review and Assesments
Secure Code Review by Third-Party
All code running behind Manor undergoes a thorough secure code review conducted by specialized assessors. This review carefully examines the code for security issues, vulnerabilities, and potential risks.
AEC has been responsible for conducting the code review for Manor.
Customer Assessments
Manor is regularly subjected to assessments by larger customers who perform their own risk assessments, audits, and other evaluations on the systems in use. Manor has successfully undergone such assessments on various occasions and welcomes them when requested by prospective or existing customers.
Assessments
Manor undergoes regular assessments by international customers who have strict security requirements.
Large certifications
Manor is a certified system by one of the world's top four auditing firms, which means that subsidiaries are allowed to use the system in their operations.
Data Security
Advnaced Data Centers
Manor operates its software in AWS data centers in Ireland, which we consider to be the most secure in the world.
Incident Recovery Plan
Manor follows an incident response plan in case unforeseen events occur. These plans are part of Manor's quality handbook and an integral part of our commitment to protecting personal data.
Multiple Availability zones
Manor utilizes multiple availability zones within AWS, meaning that one or more data centers can lose connectivity without disrupting Manor's operations.
Automated Data Backup
Manor stores live copies of all data in two separate locations within AWS to maximize reliability. In addition, Manor has various AWS services in place to ensure data backups.