Information Security Policy

Silk Route Logistics Inc. — Kalamazoo, Michigan
Document ID: SRL-ISP-2026-001 Version: 1.0 Effective: February 19, 2026 Classification: Public

Table of Contents

  1. Purpose & Scope
  2. Security Governance
  3. Access Control
  4. Authentication & Session Management
  5. Data Protection & Encryption
  6. Network & Infrastructure Security
  7. Application Security
  8. Incident Response
  9. Business Continuity
  10. Vendor & Third-Party Security
  11. Employee Security Awareness
  12. Regulatory Compliance
  13. Policy Review & Updates

1. Purpose & Scope

This Information Security Policy establishes the security framework for Silk Route Logistics Inc. ("SRL", "the Company"). It defines the controls, standards, and procedures that protect the confidentiality, integrity, and availability of company information assets.

1.1 Scope

This policy applies to:

1.2 Data Classification

ClassificationDescriptionExamples
ConfidentialHighly sensitive; unauthorized access would cause significant harmCarrier payment details, tax IDs, insurance policy numbers, authentication credentials
InternalFor authorized personnel onlyLoad rates, carrier rates, margin data, financial reports, carrier scorecards
PublicApproved for public distributionMarketing materials, public website content, posted load information

2. Security Governance

2.1 Roles & Responsibilities

RoleResponsibility
CEO / OwnerOverall accountability for information security; approves security policies and budget
System AdministratorImplements and maintains security controls; monitors systems; manages access
Account ExecutivesHandle shipper and carrier data responsibly; report security incidents
All EmployeesComply with security policies; complete security training; protect credentials

2.2 Security Reviews

Security posture is reviewed quarterly. This policy is reviewed and updated annually or when significant changes occur to the technology stack, regulatory environment, or business operations.

3. Access Control

3.1 Role-Based Access Control (RBAC)

SRL implements strict RBAC with the principle of least privilege. The system defines the following roles:

RoleAccess Level
ADMIN / CEOFull system access including audit logs, user management, and financial data
BROKER / AELoad management, carrier network, CRM, financial operations
DISPATCH / OPERATIONSLoad management, tracking, carrier communications
ACCOUNTINGInvoicing, payments, financial reports, AR/AP management
CARRIEROwn loads, available loads, compliance documents, payment history
SHIPPEROwn shipments, tracking, invoices, analytics
READONLYView-only access to authorized areas
Every API endpoint enforces authentication and role-based authorization. Unauthorized access attempts are logged to the security audit trail.

3.2 Account Management

4. Authentication & Session Management

4.1 Multi-Factor Authentication (MFA)

SRL enforces multi-factor authentication for all user accounts:

TOTP-based 2FA uses AES-256-GCM encrypted secrets with 8 emergency backup codes.

4.2 Password Policy

RequirementStandard
Minimum length10 characters
ComplexityMust include uppercase, lowercase, number, and special character
Common password checkRejected against list of known compromised passwords
Password expiry60 days — forced change on next login
Hash algorithmbcrypt with 12 salt rounds

4.3 Session Management

4.4 Brute Force Protection

5. Data Protection & Encryption

5.1 Encryption in Transit

5.2 Encryption at Rest

5.3 Sensitive Data Handling

Confidential data fields are automatically encrypted on write and decrypted on read using Prisma middleware. The encryption key is derived from a server-side environment variable and never exposed to clients.

6. Network & Infrastructure Security

6.1 Infrastructure

ComponentProviderSecurity Features
Frontend HostingCloudflare PagesDDoS protection, WAF, global CDN, automatic HTTPS
Backend APIRenderManaged infrastructure, automatic TLS, private networking
DatabaseNeon (PostgreSQL)Encryption at rest, SSL connections, automated backups
Email ServiceResendDKIM/SPF/DMARC authenticated sending

6.2 Security Headers

The following HTTP security headers are enforced on all API responses:

6.3 CORS Policy

Cross-Origin Resource Sharing is restricted to explicitly configured origins. Credentials are only accepted from whitelisted domains.

7. Application Security

7.1 Input Validation

7.2 API Security

7.3 Dependency Management

8. Incident Response

8.1 Incident Classification

SeverityDescriptionResponse Time
CriticalActive breach, data exfiltration, system compromiseImmediate (within 1 hour)
HighVulnerability actively exploited, unauthorized access detectedWithin 4 hours
MediumSuspicious activity, failed intrusion attemptsWithin 24 hours
LowPolicy violation, configuration issueWithin 72 hours

8.2 Response Procedures

  1. Detection: Automated monitoring via security audit logs, system logs, and failed login tracking
  2. Containment: Isolate affected systems, revoke compromised credentials, blacklist tokens
  3. Investigation: Review audit logs, identify scope and impact
  4. Recovery: Restore from backups if needed, patch vulnerabilities, reset credentials
  5. Notification: Notify affected parties within 72 hours as required by applicable laws
  6. Post-Incident Review: Document lessons learned, update security controls

8.3 Audit Logging

The following events are logged with timestamps, user IDs, IP addresses, and user agents:

9. Business Continuity

9.1 Backup & Recovery

9.2 Availability

10. Vendor & Third-Party Security

All third-party services are evaluated for security posture before integration:

VendorServiceData SharedSecurity Measures
NeonDatabase hostingAll application dataSOC 2, encryption at rest, SSL
CloudflareCDN & hostingStatic assets, DNSSOC 2, DDoS protection, WAF
RenderAPI hostingApplication runtimeSOC 2, TLS, private networking
ResendEmail deliveryEmail addresses, OTP codesTLS, DKIM/SPF
API keys and secrets are stored as environment variables, never committed to source code. The ENCRYPTION_KEY is a high-entropy secret stored securely on the deployment platform.

11. Employee Security Awareness

12. Regulatory Compliance

Silk Route Logistics operates in compliance with applicable regulations:

The Company maintains a Privacy Policy and Terms of Service that outline data handling practices and user rights.

13. Policy Review & Updates

This policy is a living document and will be reviewed:

VersionDateAuthorChanges
1.0February 19, 2026SRL SecurityInitial policy document