Information Security Policy
Objective
Establish guidelines to protect the information, systems, and services managed by Selfish.
Scope
It applies to all projects, infrastructure, collaborators, and services used in the operation.
guidelines
- Role-based access controls and the principle of least privilege are implemented.
- Encryption in transit is used via HTTPS (TLS 1.2 or higher)
- The infrastructure is based on cloud providers with certifications (e.g., AWS, Google Cloud)
- Access to critical systems is restricted to authorized personnel only.
- The use of strong passwords and good credential management practices is promoted.
Our Approach
Selfish It adopts practices aligned with industry standards (OWASP, cloud best practices), without currently having formal certification.










