This Information Security Policy establishes the security framework for Silk Route Logistics Inc. ("SRL", "the Company"). It defines the controls, standards, and procedures that protect the confidentiality, integrity, and availability of company information assets.
1.1 Scope
This policy applies to:
All employees, contractors, and third-party service providers
All information systems, applications, and infrastructure
All data processed, stored, or transmitted by the Company
The SRL web platform, Account Executive Portal, Carrier Portal, and Shipper Portal
1.2 Data Classification
Classification
Description
Examples
Confidential
Highly sensitive; unauthorized access would cause significant harm
Marketing materials, public website content, posted load information
2. Security Governance
2.1 Roles & Responsibilities
Role
Responsibility
CEO / Owner
Overall accountability for information security; approves security policies and budget
System Administrator
Implements and maintains security controls; monitors systems; manages access
Account Executives
Handle shipper and carrier data responsibly; report security incidents
All Employees
Comply with security policies; complete security training; protect credentials
2.2 Security Reviews
Security posture is reviewed quarterly. This policy is reviewed and updated annually or when significant changes occur to the technology stack, regulatory environment, or business operations.
3. Access Control
3.1 Role-Based Access Control (RBAC)
SRL implements strict RBAC with the principle of least privilege. The system defines the following roles:
Role
Access Level
ADMIN / CEO
Full system access including audit logs, user management, and financial data
TOTP secrets: AES-256-GCM encrypted before database storage
Passwords: One-way bcrypt hash (12 rounds) — never stored in plaintext
OTP codes: SHA-256 hashed before storage
5.3 Sensitive Data Handling
Confidential data fields are automatically encrypted on write and decrypted on read using Prisma middleware. The encryption key is derived from a server-side environment variable and never exposed to clients.
Tax IDs and insurance policy numbers are encrypted at the application layer
Payment details are processed through secure channels
Personal information is only accessible to authorized roles
API responses exclude sensitive fields not needed by the requesting role
Database: Automated daily backups with point-in-time recovery (Neon)
Application code: Version controlled in Git with remote repositories
Recovery Time Objective (RTO): 4 hours
Recovery Point Objective (RPO): 24 hours
9.2 Availability
Frontend served via Cloudflare's global CDN for high availability
Backend deployed on Render with automatic restarts and health checks
Database on Neon with automatic failover capabilities
10. Vendor & Third-Party Security
All third-party services are evaluated for security posture before integration:
Vendor
Service
Data Shared
Security Measures
Neon
Database hosting
All application data
SOC 2, encryption at rest, SSL
Cloudflare
CDN & hosting
Static assets, DNS
SOC 2, DDoS protection, WAF
Render
API hosting
Application runtime
SOC 2, TLS, private networking
Resend
Email delivery
Email addresses, OTP codes
TLS, DKIM/SPF
API keys and secrets are stored as environment variables, never committed to source code. The ENCRYPTION_KEY is a high-entropy secret stored securely on the deployment platform.
11. Employee Security Awareness
All employees are briefed on information security policies during onboarding
Phishing awareness: employees are trained to identify and report suspicious communications
Credentials must not be shared, written down, or stored in plain text
Work devices must use screen locks and up-to-date antivirus protection
Security incidents must be reported immediately to the System Administrator
Multi-factor authentication (TOTP) is strongly recommended for all employee accounts
12. Regulatory Compliance
Silk Route Logistics operates in compliance with applicable regulations:
FMCSA Regulations: Carrier verification, safety scores, and authority validation
CCPA / State Privacy Laws: User data rights, deletion requests, privacy notices
PCI Awareness: No credit card data is stored directly; payment processing is handled through third-party providers
CAN-SPAM Act: Email communications include unsubscribe options