KonnectxD
Trust Center

Security Is Foundational.

Enterprise procurement teams and auditors — everything you need to evaluate our security posture, compliance certifications, and data handling commitments.

5,000+Active Users
25+Security Controls
12Mega-Projects
4Deployment Regions

Certifications & Standards

Our security and data handling practices are certified and aligned with industry-recognized frameworks.

ISO/IEC 27001:2022

Information Security

Certified information security management system — independently audited with annual reviews, risk assessments, and mandatory security training for all personnel.

Certified

GDPR

Data Protection

Full compliance with the General Data Protection Regulation including data subject rights, breach notification, DPO oversight, and Article 28 data processing terms.

Active
🔜

SOC 2 Type II

Security & Availability

Enterprise-grade controls for security, availability, and confidentiality — building on existing ISO 27001 controls mapped to Trust Services Criteria.

Target Q2 2026

25 Verifiable Controls

Granular security controls across infrastructure, organizational, product, and operational domains — each with a verifiable statement.

Infrastructure Security

Cloud hosting, encryption, network isolation, and backup controls.

☁️Active

Cloud Hosting

All production workloads hosted on Microsoft Azure with ISO 27001 and SOC 2 certified data centers.

🔒Active

Network Isolation

Virtual network segmentation with no public IP addresses on application servers; all traffic routed through Azure Front Door.

🔐Active

Encryption at Rest

All data encrypted at rest using AES-256 via Azure Storage Service Encryption and Azure SQL TDE.

🔗Active

Encryption in Transit

All communications encrypted with TLS 1.2+ minimum; HSTS enforced with 1-year max-age.

🗝️Active

Key Management

Encryption keys managed via Azure Key Vault with HSM-backed keys and quarterly rotation.

🛡️Active

DDoS Protection

Azure DDoS Protection Standard enabled on all public endpoints with auto-mitigation.

💾Active

Geo-Redundant Backups

Automated daily backups with geo-redundant storage; 30-day retention with point-in-time restore.

⚙️Active

Infrastructure as Code

All infrastructure provisioned via Terraform/Bicep with version-controlled state and PR-gated deployments.

Organizational Security

Policies, training, insurance, and access governance.

🎓Active

Security Training

All personnel complete annual security awareness training with tracked completion rates.

🔍Active

Background Checks

Pre-employment background verification conducted for all staff with access to production systems.

📋Active

Access Reviews

Quarterly access reviews conducted across all systems with documented approvals and revocations.

📜Active

Acceptable Use Policy

Enforced acceptable use policy covering devices, data handling, and third-party tool usage.

🏛️Active

Cybersecurity Insurance

Active cyber liability insurance policy covering data breach, ransomware, and business interruption.

Product Security

Authentication, authorization, logging, and code-level protections.

🔑Active

Authentication

Multi-factor authentication (MFA) enforced for all user accounts; SSO via Azure AD supported.

👥Active

Role-Based Access Control

Granular RBAC with project-level, discipline-level, and document-level permissions; principle of least privilege enforced.

Active

Privileged Identity Management

Just-in-time elevated access via Azure PIM; all admin actions logged with approval workflows.

⏱️Active

Session Management

Automatic session timeout after 30 minutes of inactivity; concurrent session limits enforced.

📊Active

Audit Logging

All data access, modifications, and administrative actions logged with user identity, timestamp, and IP; logs retained for 12 months.

Active

Input Validation

Server-side input validation on all API endpoints; parameterized queries prevent SQL injection.

🔬Active

Dependency Scanning

Automated dependency vulnerability scanning via Snyk/Dependabot on every PR with blocking on critical CVEs.

Operational Security

Change management, vulnerability scanning, monitoring, and testing.

🔄Active

Change Management

All production changes go through documented change management with peer review and staged rollout.

🐛Active

Vulnerability Management

Monthly vulnerability scans on all production infrastructure; critical findings remediated within 72 hours.

🎯Active

Penetration Testing

Annual third-party penetration testing conducted by an independent security firm; findings tracked to closure.

📡Active

Monitoring & Alerting

24/7 monitoring via Azure Monitor and Application Insights; automated alerts for anomalies with on-call rotation.

🧩Active

Configuration Management

Maintained configuration baseline for all production systems; drift detection enabled.

How We Operate

From code to cloud — the practices that keep your data safe across the entire development and operations lifecycle.

🛠️

Secure Development Lifecycle (SDLC)

Code reviews mandatory on all pull requests. Static analysis (ESLint security rules, SonarQube) runs on every commit. Staging environment mirrors production for pre-release validation. No direct commits to main — all changes go through protected branches with CI/CD gates.

🐛

Vulnerability Management

Monthly automated scans across all production infrastructure (Azure Security Center). Dependency scanning on every PR (Snyk/Dependabot). Critical CVEs remediated within 72 hours. Medium within 30 days. All findings tracked in a risk register with assigned owners.

🏗️

Business Continuity & Disaster Recovery

Documented BCP and DR plans tested annually. RPO: 1 hour (geo-redundant backups). RTO: 4 hours (automated failover). Runbooks maintained for all critical services with defined escalation paths.

🎓

Employee Security Training

Annual security awareness training for all personnel (phishing simulations, data handling, incident reporting). Role-specific training for developers (OWASP Top 10, secure coding) and ops (cloud security, access management). Completion tracked and enforced.

🤝

Vendor Risk Management

All third-party vendors assessed for security posture before onboarding. Annual reassessment of critical vendors. Vendors must demonstrate SOC 2 or ISO 27001 compliance. Data processing agreements in place for all sub-processors per GDPR Article 28.

Our Commitments to Your Data

Six non-negotiable promises that govern how we handle every byte of your project data.

Client data ownership
You retain full ownership of all data uploaded to the platform.
No third-party sharing
Client data is never shared with third parties without explicit consent.
Data encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.2+).
Right to export
Full data export available at any time during and after contract.
Secure deletion
All data securely deleted upon contract termination unless otherwise agreed.
Audit trail
Detailed logs of all data access and modifications, available for audit.

Structured Response, Defined SLAs

A 6-phase incident response lifecycle with severity-based SLAs and transparent client communication.

01
Detection

Automated monitoring detects anomalies via Azure Monitor, Application Insights, and Security Center alerts. Users can also report incidents via support channels.

02
Triage & Classification

Incidents classified by severity (P1–P4) within the acknowledgement SLA. Initial impact assessment and team assignment.

03
Containment

Immediate actions to limit blast radius: isolate affected systems, revoke compromised credentials, block malicious IPs.

04
Eradication

Root cause identified and eliminated. Affected systems patched, hardened, or rebuilt as needed.

05
Recovery

Services restored from clean backups or failover. Validation testing before full restoration. Monitoring intensified for 72 hours post-recovery.

06
Post-Incident Review

Blameless post-mortem conducted within 5 business days. Root cause analysis published. Corrective actions tracked to completion in risk register.

Severity-Based SLAs

SeverityDefinitionAcknowledgeContainEradicateRecoverClient Notification
P1 — CriticalData breach, complete service outage, or active exploitation15 minutes1 hour8 hours24 hoursWithin 1 hour of confirmation
P2 — HighPartial service degradation, potential data exposure, or high-severity vulnerability30 minutes2 hours24 hours48 hoursWithin 4 hours
P3 — MediumNon-critical system issue, low-risk vulnerability, or policy deviation4 hours24 hours5 business days10 business daysNext scheduled update
P4 — LowInformational, cosmetic, or improvement-category findings1 business dayN/A30 business daysN/AQuarterly report

Communication Protocols

🚨

P1/P2 Incidents

Direct email notification to designated client security contacts within the SLA window. Status updates every 2 hours until resolved.

📋

Monthly Security Digest

Summary of all incidents (redacted), control changes, and compliance updates sent to client security contacts.

📄

Post-Mortem Reports

Post-incident reports available in the Trust Center vault for P1/P2 incidents within 10 business days.

Data Residency & Sovereignty

Choose your deployment region. Your data stays where you need it — guaranteed by contract.

Europe
West Europe
Netherlands (Amsterdam)
EU-based clients, GDPR-primary
Asia-Pacific
Southeast Asia
Singapore
APAC projects, yards in China/Singapore
Middle East
UAE North
Dubai
GCC-based projects, Saudi Aramco requirements
Americas
East US 2
Virginia, USA
North/South American operations

Contractual Guarantees

Data stays in your chosen region

Production data is never replicated outside the contracted Azure region without explicit written consent.

Negotiable data location

Data residency region is specified in the contract and can be changed upon mutual agreement.

Cross-border transfer protections

Where data crosses borders (e.g., for AI processing), Standard Contractual Clauses (SCCs) are in place per GDPR Chapter V.

Right to audit

Clients have the right to audit data location compliance, either directly or through an appointed third-party auditor.

Infrastructure Partners

Third-party services that process data on behalf of the platform, disclosed for GDPR transparency.

VendorPurposeData LocationEncryptionCompliance
Microsoft AzureCloud hosting, compute, storage, database, identityWest Europe (Netherlands), Southeast Asia (Singapore) — negotiable per contractAES-256 at rest, TLS 1.2+ in transit
ISO 27001SOC 2 Type IIGDPR
MongoDB AtlasDocument database (metadata, configurations)Azure-hosted, same region as primary workloadAES-256 at rest, TLS 1.2+ in transit, client-side field-level encryption available
ISO 27001SOC 2 Type IIHIPAAGDPR
Google Cloud PlatformAI/ML services (Gemini, Vertex AI), analyticsUS Multi-region — data processed ephemerally, not storedTLS 1.3 in transit, encryption at rest for any cached data
ISO 27001SOC 2 Type IIGDPR
Autodesk Platform Services3D model translation and viewing (Forge/APS)US-based processing; translated derivatives stored in AzureTLS 1.2+ in transit, AES-256 at rest
SOC 2 Type IIISO 27001
CloudflareCDN, DDoS protection, WAF, DNSGlobal edge network — no data stored, pass-through onlyTLS 1.3 in transit, no data at rest
ISO 27001SOC 2 Type IIGDPR
Twilio SendGridTransactional email delivery (notifications, reports)US-based processing; email metadata retained per SendGrid policyTLS in transit
SOC 2 Type IIGDPR

Sub-processor list updated quarterly. Material changes communicated to clients 30 days in advance per our DPA terms.

Where We're Headed

Current certifications and planned framework adoption — our multi-year compliance trajectory.

ISO/IEC 27001:2022Certified
Information Security

Independently audited ISMS. Annual surveillance audits.

2024
GDPRActive
Data Protection

Full compliance including DPO oversight and Article 28 DPA terms.

2024
SOC 2 Type IIIn Progress
Security & Availability

Trust Services Criteria mapped from ISO 27001 controls. Audit engagement underway.

Q2 2026
ISO 22301Evaluating
Business Continuity

Business continuity management system alignment under evaluation.

2027
HIPAAEvaluating
Healthcare Data

Evaluating applicability for healthcare infrastructure clients.

TBD
PCI DSSNot Started
Payment Card Data

Under consideration for clients processing payment card data.

TBD

Last updated: 2026-03-07

🔒

Full Compliance Documentation

Request access to our Trust Center vault — ISO 27001 certificate, penetration test summary, DPA template, security architecture overview, and BCP documentation.

Request Access →

Security & Compliance FAQ

Is Konnect xD secure?

Yes — Konnect xD implements encryption at rest and in transit, multi-factor authentication, role-based access control, and full GDPR compliance. The platform undergoes regular security updates and independent audits as part of our ISO 27001 certification.

Who owns the data?

You do. Twintech acts as the data custodian under clearly defined Controller/Processor roles (GDPR Article 28). Full data export is available at any time — no vendor lock-in, no data hostage.

Where is data stored?

Data is stored in secure Azure cloud environments that comply with ISO 27001 international security standards. Data residency location is negotiable per contract to meet your regulatory requirements — we offer regions in Europe, Asia-Pacific, Middle East, and Americas.

Does Konnect xD comply with GDPR?

Yes — full GDPR compliance including data subject rights (access, rectification, erasure, portability), breach notification within mandated timelines, and Data Protection Officer oversight. Our EULA includes comprehensive Article 28 data processing terms.

What happens to our data if we leave?

You receive a full data export in standard formats, after which all data is securely deleted from all servers. This process is documented in our data processing agreement.

Is there an audit trail?

Yes — all data access and modifications are logged with timestamps and user identifiers. Audit logs are retained for 12 months and reports are available on request for your compliance team.

What security controls does Konnect xD have?

We maintain 25+ security controls across four categories: Infrastructure (encryption, network isolation, DDoS protection), Organizational (training, background checks, access reviews), Product (MFA, RBAC, audit logging, input validation), and Operational (vulnerability scanning, pen testing, monitoring). All controls are reviewed quarterly.

What is your incident response process?

We follow a 6-phase incident response lifecycle: Detection, Triage & Classification, Containment, Eradication, Recovery, and Post-Incident Review. Critical incidents (P1) are acknowledged within 15 minutes with client notification within 1 hour. All P1/P2 incidents include blameless post-mortems.

Can we choose where our data is hosted?

Yes — we offer four Azure deployment regions: Europe (Netherlands), Asia-Pacific (Singapore), Middle East (Dubai), and Americas (Virginia). Your data residency region is specified in the contract and production data is never replicated outside the contracted region without explicit written consent.

How can we access compliance documentation?

Request access through our Trust Center vault at /trust/vault. Available documents include our ISO 27001 certificate, penetration test executive summary, DPA template, security architecture overview, business continuity plan summary, and sub-processor data flow map.

Powering Mega-Projects Worldwide

From FPSOs in Guyana to LNG in Canada — Konnect xD connects Asset Owners, EPC Contractors, and Construction Yards on a single digital thread.

2021
FPSO Unity
OwnerExxonMobil
EPCSBM Offshore
YardKeppel · Dyna-Mac
2021
FPSO Prosperity
OwnerExxonMobil
EPCSBM Offshore
YardKeppel · SWS
2022
FPSO Sepetiba
OwnerPetrobras
EPCSBM Offshore
YardBOMESC
2022
Marjan Package 4
OwnerSaudi Aramco
EPCMcDermott
YardQMW · Batam · Jebel Ali
2023
FPSO ONE GUYANA
OwnerExxonMobil
EPCSBM Offshore
YardSWS · Seatrium
2023
FPSO Gusmão
OwnerPetrobras
EPCSBM Offshore
YardCOSCO Qidong
2023
FPSO Almirante Tamandaré
OwnerPetrobras
EPCSBM Offshore
YardCMHI
2023
Scarborough FPU
OwnerWoodside
EPCMcDermott
YardQMW · COSCO Qidong
2024
Ruya Development
OwnerNOC Qatar
EPCMcDermott
YardQMW
2024
Woodfibre LNG
OwnerPacific Energy
EPCMcDermott
2025
FPSO Symphony
OwnerExxonMobil
EPCSBM Offshore
YardSWS · Seatrium
2025
FPSO GranMorgu
OwnerTotalEnergies
EPCSBM Offshore
Multi-Company Collaboration Across 3 Layers
Asset Owners
ExxonMobilPetrobrasSaudi AramcoWoodsideTotalEnergiesNOC QatarPacific Energy
EPC Contractors
SBM OffshoreMcDermott
Construction Yards
KeppelDyna-MacBOMESCSWSCOSCOCMHISeatriumQMWBatamJebel Ali

Measured, Not Marketed

Every number here is from production. No inflated benchmarks, no hypothetical projections.

50+Apps Built
4.57/5User Satisfaction
5 YearsTrack Record
14Construction Yards
SBM Offshore
McDermott
Saudi Aramco
Technip Energies
ExxonMobil
Air Products
SBM Offshore
McDermott
Saudi Aramco
Technip Energies
ExxonMobil
Air Products

What Our Clients Say

Real feedback from construction directors and general managers running Konnect xD on live projects.

Konnect xD is one of the greatest and most exciting opportunity to improve what we do and land construction into the 21st century.

SBM Offshore
Karim Bouab
Construction Director, SBM Offshore

Konnect xD interfaces with a large number of our systems, both internal and external, and is able to act as a cornerstone for system integration, Konnect xD plays a critical role in getting all the data integrated, analysed and presented.

Qingdao McDermott Wuchuan
Qiuzhe Li
General Manager, Qingdao McDermott Wuchuan

See the Platform

Explore how Konnect xD connects every layer of project execution — or start a guided pilot on your real project data.