Security Overview
§1Overview and Scope
§2Information-Security Governance
§3Personnel Security
- All Wendel personnel with access to production systems are subject to a documented background check prior to commencement of duties, to the extent permitted by applicable law.
- All personnel execute confidentiality undertakings and acknowledge the Acceptable Use Policy as a condition of employment or engagement.
- Personnel complete mandatory information-security and privacy training upon onboarding and at least annually thereafter; completion is tracked.
- Access to production systems is revoked within twenty-four (24) hours of separation from Wendel or upon a documented change in role.
§4Access Control and Authentication
Access to production systems is granted on the principles of least privilege and need-to-know. All administrative and engineering access requires multi-factor authentication (MFA) using FIDO2 hardware security keys or equivalent phishing-resistant authenticators. Shared credentials are prohibited; every action is attributable to a specific named identity.
End Users authenticate to the Services through the School's configured identity provider (typically Google Workspace for Education or Microsoft Entra ID) or through Wendel-issued credentials secured with bcrypt password hashing (cost factor 12 or greater) and rate-limited login attempts.
§5Tenant Isolation
§6Cryptography and Key Management
School Data is encrypted in transit using Transport Layer Security version 1.2 or later, with cipher suites limited to those rated "recommended" by the Mozilla SSL Configuration Generator. All certificates are issued by a publicly trusted certificate authority and rotated automatically at least ninety (90) days prior to expiration.
School Data is encrypted at rest using the Advanced Encryption Standard with 256-bit keys (AES-256). Cryptographic keys are managed by Wendel's managed infrastructure provider using FIPS 140-2 validated hardware-security modules. Application-level secrets (such as API tokens and database credentials) are stored in a dedicated secrets-management system with access logged and audited.
§7Network Security and Hardening
§8Application-Layer Security
- All session cookies are issued with the HttpOnly, Secure, and SameSite=Lax attributes.
- Cross-Site Request Forgery (CSRF) protections are applied to all state-mutating endpoints.
- A Content-Security Policy header is set on all responses to restrict script sources to Wendel-controlled origins.
- Input validation is performed at the application layer using strict schemas; parameterized queries are used exclusively at the database layer.
- Rate-limiting is applied to authentication, attendance check-in, and rotating-QR-code generation endpoints to mitigate enumeration and abuse.
§9Vulnerability Management and Patching
Wendel monitors first-party and third-party dependencies for known vulnerabilities through automated dependency scanning and the National Vulnerability Database. Critical-severity vulnerabilities in production components are remediated within seven (7) days of discovery; high-severity vulnerabilities within thirty (30) days; medium-severity within ninety (90) days, in each case subject to availability of a vendor-supplied fix.
Annual third-party penetration testing is conducted against the production environment. The most recent report is made available to Schools under DPA upon written request subject to a customary confidentiality undertaking.
§10Logging, Monitoring, and Audit
§11Secure Software-Development Lifecycle
- All code changes are reviewed by at least one engineer other than the author prior to merge to the main branch.
- Continuous integration runs static-analysis and dependency-vulnerability checks on every pull request.
- Production deployments are performed exclusively through an automated continuous-deployment pipeline; manual deployment to production is prohibited absent a documented break-glass procedure.
- Feature flags are used to roll out high-risk changes incrementally; rollbacks are achievable within minutes.
- Threat modeling is performed for any new feature that introduces a new data-flow or trust boundary.
§12Security-Incident Response
§13Business Continuity and Disaster Recovery
§14Subprocessor Due Diligence
§15Physical and Environmental Controls
§16Asset and Endpoint Management
§17Data Handling and Classification
§18Audits, Certifications, and Third-Party Assessments
Wendel intends to commission an independent third-party SOC 2 Type II examination once it satisfies the applicable audit-readiness thresholds (typically twelve (12) months of operational history with the controls in effect). Pending the availability of a SOC 2 Type II report, Wendel will provide, upon written request and subject to a customary confidentiality undertaking:
- Wendel's written information-security policies;
- the most recent third-party penetration-test summary;
- the current Subprocessor list with each Subprocessor's compliance certifications; and
- a written response to a reasonable security questionnaire submitted by the School.
§19Coordinated Vulnerability Disclosure
§20Contact
Attn: Security
[Mailing address to be provided to Schools upon execution of a DPA]