Security | greytHR
new-feature-tagHR Predictions for 2026
IN

Introduction

At Greytip, security and privacy are foundational to every decision we make. We operate in a highly sensitive HR/Payroll domain, and we take this responsibility seriously. Our security program is built on globally recognized standards — including ISO 27001, SOC 2, GDPR, NIST, and Zero Trust principles — to ensure the confidentiality, integrity, and availability of your data.

Table of Contents

Security Principles & Program Overview

Our security strategy is built on six core principles:

PrincipleTo Be Sent To
Zero TrustVerify every identity, device, and action
Defence in DepthMultiple layers of controls and monitoring
Privacy by DesignData minimization and GDPR-aligned handling
Shared ResponsibilityClear roles for us and our customers
Continuous Monitoring24/7 visibility of platform activity
Continuous ImprovementRegular testing, reviews, and training

Governance foundations include:

  • Documented policies & ISMS (ISO-aligned)
  • Risk assessment & control framework
  • Dedicated Security & Privacy leadership
  • Third-party oversight and vendor risk management

Platform Architecture & Infrastructure Security

We host our platform on secure, industry-leading cloud providers (AWS/GCP), benefitting from robust physical and environmental controls. Key infrastructure protections:

  • Network segmentation & private VPCs
  • WAF and DDoS protection
  • Hardened OS and secure baseline configurations
  • Regular vulnerability scanning & patch management
  • Encrypted backups and tested recovery procedures
  • Least-privilege IAM roles across cloud resources Our architecture follows best practices for availability, scalability, and isolation, ensuring tenant and data protection at every layer.

Identity, Authentication & Access Control

We enforce strict identity security, applying the Zero Trust model:

  • Single Sign-On (SSO) & Multi-Factor Authentication (MFA)
  • Mandatory least-privilege and role-based access (RBAC)
  • Just-in-Time privileged access (no standing admin rights)
  • Provisioning/de-provisioning automation (SCIM)
  • Session controls and secure password policies All access to production systems is logged, monitored, and continuously reviewed.

Data Protection & Privacy

Protecting personal and payroll data is central to our security mission.

PrincipleImplementation
Encryption in transitTLS 1.2+
Encryption at restAES-256
Key ManagementCloud KMS
Data MinimizationGDPR-aligned
Data RetentionDefined lifecycle + deletion workflows
PseudonymizationUsed in lower environments

We comply with GDPR data rights, including access, correction, deletion, portability, and objection. We do not sell or share data for marketing purposes.

Secure Development & Application Security

Our Secure SDLC ensures security is embedded throughout product development.

  • Static analysis (SAST) and dependency scanning (SCA)
  • Secrets scanning & secure secret storage
  • Dynamic testing (DAST) for runtime issues
  • Penetration testing by 3rd party at least annually
  • Threat modeling for high-risk features
  • Secure coding training for engineers All code changes require peer review + CI/CD security gates before reaching production.

Monitoring, Detection & Incident Response

Our internal Security Operations Center (SOC) provides proactive threat detection.

  • 24/7 log monitoring through SIEM
  • Alerts for anomaly, abuse, and escalation paths
  • Documented Incident Response Plan (IRP)
  • Root cause analysis and post-incident reviews
  • SOAR automation for rapid containment We commit to timely customer communication for security incidents, per contractual and regulatory requirements.

Business Continuity & Disaster Recovery

Resilience is engineered into our platform.

ComponentApproach
BackupsAutomated, encrypted, tested
DR TestingAnnual minimum
RTO/RPOEnterprise-grade objectives
RedundancyCloud multi-AZ architecture

Payroll availability is mission-critical — our DR strategy reflects that.

Compliance & Certifications

We align to and/or maintain:

  • SOC 2
  • ISO 27001
  • GDPR Ready
  • Data Processing Agreements (DPA)
  • NIST-aligned policies for control design Audit artifacts are available under NDA for customers.

Shared Responsibility Model

Security is a partnership. We secure the platform and infrastructure — customers secure their access, configurations, and internal user practices.

Security FAQs (Procurement-Focused)

1.Do you encrypt data?
Yes — AES-256 at rest, TLS 1.2+ in transit.

2.Do you perform pen tests?
Yes — annually by independent testers.

3.Do you support SSO & MFA?
Yes — both are supported and recommended.

4.Can we sign a DPA?
Yes — upon request.

5.Do you have incident response plans?
Yes — documented, tested, and SOC-monitored.

6.Do you store audit logs?
Yes — centrally stored, monitored, and retained.

Related Posts

Attendance Management

A Guide to Attendance Management

Everything you need to know about managing attendance for your company
HRMS

Subscribe to our newsletter

  • Product
  • HR Software
  • Payroll Software
  • Leave Management
  • Attendance Management
  • Performance Management
  • Employee Self Service
  • Employee Engagement
  • Unite Marketplace
  • Recruitment Software
  • Expense Management
  • greytHR Service Status
greytHR-logo
GDPR Compliant certification badgeSoc2 certification badgeISO Certification Badge
WhatsApp LogoMessage us on WhatsApp
Grape Garden, #29 & 30, 17th Main, 6th Block, Koramangala, Bengaluru - 560095
© 2026 Greytip Software Pvt. Ltd.
Privacy PolicyTerms of Use
FacebookTwitterLinkedInInstagramYouTube