Back to Home
Legal Document

Trust & Security Center

How Fininvo protects your data with enterprise-grade security infrastructure

Last Updated

February 28, 2026

Effective Date

March 1, 2026

Version

1.0

This Trust & Security Policy is published by Fininvo, a trade name of Prashbi Global Services Pvt. Ltd., a company incorporated under the laws of India (CIN: U52100KA2020PTC133490), with its registered office at Tholons Tower, 346 HIG, 17th Cross Rd, Dollars Colony, R.M.V. 2nd Stage, Bengaluru, Karnataka 560094, India. References to "Fininvo", "we", "us", or "our" in this document refer to Prashbi Global Services Pvt. Ltd..

1

Security Overview & Philosophy

At Fininvo, security is not an afterthought — it is foundational to everything we build. Our platform is designed with a security-first mindset, ensuring that your financial data, employee records, and business operations are protected by enterprise-grade safeguards at every layer.

Our Security Commitment

Zero-trust architecture, defense-in-depth strategy, and continuous monitoring protect businesses across 150+ countries with 99.9% uptime.

We follow the principle of least privilege across all systems, enforce strict separation of tenant data, and conduct regular third-party audits to validate our security posture. Our dedicated security team operates around the clock to monitor, detect, and respond to threats before they impact your business.

99.9%

Platform Uptime

24/7

Security Monitoring

150+

Countries Supported

2

Infrastructure Security

Fininvo runs on Amazon Web Services (AWS), leveraging their world-class infrastructure to provide a secure, resilient, and globally distributed platform.

Multi-Region Deployment

  • • AWS multi-region architecture
  • • Automatic failover across availability zones
  • • Data residency options (India, EU, US)

Network Isolation

  • • VPC isolation per environment
  • • Private subnets for databases
  • • Security groups with least-privilege rules

Edge Protection

  • • AWS WAF (Web Application Firewall)
  • • AWS Shield for DDoS protection
  • • CloudFront CDN with TLS termination

Monitoring & Logging

  • • Real-time infrastructure monitoring
  • • Centralized log aggregation
  • • Automated anomaly detection

Enterprise Feature: Dedicated VPC deployment and custom network configurations are available for Enterprise customers requiring additional isolation.

3

Data Encryption

All data is encrypted both at rest and in transit using industry-leading cryptographic standards. We ensure that your sensitive financial and employee data is never exposed in plaintext.

AES-256

Encryption at Rest

TLS 1.3

Encryption in Transit

AWS KMS

Key Management

At Rest

All databases, backups, and file storage are encrypted with AES-256. Encryption keys are managed through AWS KMS with automatic key rotation every 365 days.

In Transit

All API communications enforce TLS 1.3 with strong cipher suites. HSTS headers are applied to prevent protocol downgrade attacks.

Enterprise Feature: Customer-managed encryption keys (CMEK) allow Enterprise customers to maintain full control over their encryption keys through AWS KMS or their own HSM.

4

Access Controls

Fininvo implements comprehensive access control mechanisms to ensure only authorized users can access your data, with complete audit trails for every action.

Role-Based Access Control (RBAC)

  • • Granular role and permission management
  • • Module-level access restrictions
  • • Tenant-level data isolation

Multi-Factor Authentication (MFA)

  • • TOTP-based authenticator app support
  • • Enforced MFA for admin accounts
  • • Backup recovery codes

Single Sign-On (SSO)

  • • SAML 2.0 integration
  • • OpenID Connect (OIDC) support
  • • Active Directory federation

Audit Logging

  • • Comprehensive audit trail for all actions
  • • Immutable log storage
  • • Configurable session timeouts

Session Management

JWT-based authentication with configurable expiration, automatic session invalidation on password change, and concurrent session limits to prevent unauthorized access from multiple devices.

5

Compliance & Certifications

Fininvo's security infrastructure, policies, and practices are built to meet the requirements of major international security standards and data protection regulations. Our security controls are aligned with these frameworks, and formal certification is currently in progress.

Certification Status: Fininvo's security practices are designed and implemented in accordance with the controls required by ISO 27001 and SOC 2 Type II. Formal certification audits are underway, and we expect to complete them in 2026. Our current security posture already meets or exceeds the technical and organizational requirements of these standards.

ISO 27001-Aligned

Information Security Management

Certification In Progress

SOC 2 Type II-Aligned

Security, Availability, Confidentiality

Audit In Progress

GDPR

EU Data Protection Regulation

HIPAA-Ready

Healthcare Data Protection

PCI DSS

Payment Card Data Security

Zero Trust

Architecture Framework

Compliance Documentation: Enterprise customers can request access to our security assessment reports, penetration test summaries, and compliance documentation through their Customer Success Manager or by contacting security@fininvo.com. SOC 2 Type II audit reports will be available upon completion of our formal certification.

6

Application Security

Security is embedded throughout our software development lifecycle (SDLC). Every line of code undergoes rigorous review and automated testing before reaching production.

OWASP Top 10

Our application is hardened against all OWASP Top 10 vulnerabilities including injection attacks, broken authentication, XSS, and CSRF.

Penetration Testing

Annual third-party penetration tests are conducted by certified security firms. Critical findings are remediated within 48 hours.

Code Reviews & SAST/DAST

All code changes undergo mandatory peer review. Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) run on every deployment.

Dependency Scanning

Automated dependency vulnerability scanning runs continuously in CI/CD pipelines. Known CVEs are patched within SLA timelines.

Secure Development Practices

All developers complete annual security training. Our CI/CD pipeline includes automated security gates that prevent deployment of code with critical or high-severity vulnerabilities. Container images are scanned before deployment, and secrets are never stored in source code.

7

Incident Response

Our dedicated incident response team follows a structured protocol to detect, contain, and resolve security incidents with minimal impact to your business.

<24h

Customer Notification

<72h

Root Cause Analysis

24/7

Incident Response Team

Incident Response Process

1. Detection:Automated monitoring and alerting systems detect anomalies in real-time
2. Containment:Immediate isolation of affected systems to prevent further impact
3. Investigation:Thorough forensic analysis to determine scope and root cause
4. Notification:Affected customers are notified within 24 hours of confirmed breach
5. Remediation:Comprehensive fix deployed with verification testing
6. Post-Mortem:Full RCA report provided within 72 hours with preventive measures

Breach Notification

In compliance with GDPR, HIPAA, and other applicable regulations, Fininvo will notify affected customers within 24 hours of a confirmed data breach. Notifications include the nature of the breach, data affected, remediation steps taken, and recommended actions for customers.

8

Business Continuity & Disaster Recovery

Fininvo is designed for resilience. Our disaster recovery strategy ensures your business operations continue uninterrupted, even in the face of major infrastructure failures.

<1h

RPO (Recovery Point)

<4h

RTO (Recovery Time)

Multi-AZ

Region Failover

Daily

Automated Backups

Backup Strategy

  • • Automated daily full backups
  • • Continuous transaction log backups
  • • 30-day backup retention
  • • Point-in-time recovery capability

Failover Architecture

  • • Multi-availability zone deployment
  • • Automatic database failover
  • • Load-balanced application tier
  • • Cross-region replication (Enterprise)

DR Testing

We conduct quarterly disaster recovery drills and annual full-scale failover tests to validate our recovery procedures. Results are documented and shared with Enterprise customers upon request.

9

Vulnerability Management

Fininvo takes a proactive approach to identifying and remediating vulnerabilities across our entire technology stack.

Regular Scanning

Continuous automated vulnerability scanning across infrastructure, applications, and dependencies. Critical vulnerabilities are prioritized for immediate remediation.

Responsible Disclosure

We maintain a responsible disclosure program for security researchers. Report vulnerabilities to security@fininvo.com and receive acknowledgment within 24 hours.

Bug Bounty Program

We reward security researchers who help us improve our platform security through our bug bounty program.

Rewards determined by severity and impact
Critical and high-severity issues prioritized
Rewards assessed on a case-by-case basis
Coordinated disclosure timeline (90 days)
Safe harbor protection for researchers
Public recognition on our Hall of Fame

Remediation SLAs: Critical vulnerabilities are patched within 24 hours, high-severity within 7 days, medium-severity within 30 days, and low-severity within 90 days. All patches undergo full regression testing before deployment.

10

Contact Our Security Team

Get in Touch

Security Inquiries

security@fininvo.com

Vulnerability Reports

security@fininvo.com

Enterprise Sales

enterprise@fininvo.com

Registered Office

Prashbi Global Services Pvt. Ltd.
Tholons Tower, 346 HIG, 17th Cross Rd, Dollars Colony,
R.M.V. 2nd Stage, Bengaluru, Karnataka 560094, India

CIN

U52100KA2020PTC133490