Access Governance
- Joiner–Mover–Leaver lifecycle with approvals and auditability.
- Role-based access control, least-privilege, periodic access reviews.
- Unique user accounts; use of shared accounts requires strong secondary controls.
Preventive controls, approvals and auditability help reduce operational and security risk.
Standardised workflows streamline approvals and simplify evidence collection for audits.
Comprehensive logs, reviews and reports available to support internal and external audits.
Scalable architecture with load balancing and monitoring to sustain peak loads.
Change control with staged patching, configuration baselines and compliance tracking.
Routine scanning, prioritised remediation and verification prior to closure.
Built with controls aligned to recognised standards, CARL helps protect data end-to-end and stay audit-ready.
JML workflow, least-privilege RBAC, approvals and periodic recertifications.
Integrates with enterprise IdP (SAMLv2/OIDC). MFA and password policy enforced by directory.
WAF, firewalls, IDS/IPS, segmentation, anti-DDoS and hardened endpoints.
Encrypted full/incremental backups, tested restores; retention per policy and RPO/RTO.
Auditable logs with integrity protections and KPI reporting.
Primary in-region hosting with secondary region for disaster recovery.