ikas Transparency
Learn more about ikas – from security standards to our development philosophy.
GDPR & Data Protection
Security & Login
- Are there security standards in the login process for the dashboard?
- Does ikas support two-factor authentication?
- Are user actions, login, and logout processes recorded in the e-commerce system?
- Are logs maintained for unauthorized access attempts and failed password attempts?
- Is unauthorized and critical area masking or hiding performed?
- Are user passwords stored in the database in an encrypted format?
Software Development at ikas
Technology & Infrastructure
- Which database does ikas use?
- Where is the data stored?
- Are backup procedures and applications in place to prevent data loss?
- Are backups transferred to different locations or geographical regions?
- Are data checks and restore tests performed for the received backups?
- Are defined RTO (Recovery Time Objective) and RPO (Recovery Point Objective) values in place for emergency or data loss situations?
- Do technical and administrative measures exist to ensure the continuous operation of the system?
- Do Load Balancing, High Availability, WAF, and Intrusion Detection Systems exist?