...
While our customers share a common cloud-based infrastructure when using our cloud products, we have measures in place to ensure they are logically separated so that the actions of one customer cannot compromise the data or service of other customers.
Access Security
Access der Cloud Infrastructure, read-only Zugriffe der Devs, gemanaged wird es nur über CDK, change reviews
Updates and deployments
tägliche API updates, frontend weekly