Skip to main content

Summary of Technical Security Measures - Article

Layered security model, detailing application, infrastructure, and organizational controls implemented to protect data, ensure resilience, and maintain confidentiality, integrity, and availability.
Updated: 15 Mar 2026
6 min read

Summary

This section provides an overview of the technical and organizational security measures implemented by Eurekos to protect platform data, infrastructure, and operations. Controls span the application, infrastructure, and governance layers to ensure confidentiality, integrity, and availability.

In this article you will learn:

  • How security controls are structured across application, infrastructure, and organizational layers
  • How identity management, access control, and monitoring protect the Eurekos platform
  • How encryption, network security, and backups safeguard data and infrastructure
  • How governance, vulnerability management, and threat intelligence support ongoing resilience and security maturity

Background

Summary of the core technical and organizational security measures implemented to protect data, systems, and operations against breaches, misuse, and service disruption.

Information security within a cloud-based LMS environment rests on three interdependent components:

  1. The application layer – the LMS platform itself, including configuration, roles, permissions, and access controls
  2. The infrastructure layer – the hosting environment, covering servers, hardware, network controls, and encryption mechanisms
  3. The organizational layer – governance processes, access management, data handling practices, and the human factor

Each layer contributes to safeguarding confidentiality, integrity, and availability. The measures below are structured accordingly to reflect this layered security model.

Eurekos Application Security Measures

The Eurekos application includes built-in controls designed to protect user accounts, system configuration, and platform integrity.

Control DomainSecurity ObjectiveImplemented Measure
Identity & AuthenticationEnforce strong credential standardsMinimum 12-character passwords with configurable complexity requirements
Identity & AuthenticationPrevent brute-force access attemptsAutomatic account lockout after five failed login attempts with email notification
Session ManagementReduce risk of unattended sessionsAutomatic session timeout after 24 hours (configurable) requiring re-authentication
Access Anomaly DetectionDetect suspicious login behaviorGeo-location alerts for logins >50 km from previous access (adjustable) and from new browser/device
Authorization & Least PrivilegePrevent unauthorized configuration changesRole-based access control (RBAC) with predefined roles and permission boundaries
Audit & AccountabilityEnsure traceability of system activityLogging of successful/failed logins and user/content create, modify, delete actions
Threat ProtectionMitigate automated and high-volume attacksNative flood control and automatic IP blocking
Network & Perimeter SecurityRestrict high-risk geographic accessIntegration support for third-party tools including geo-blocking

Server & Infrastructure Security Controls

The hosting environment supporting Eurekos is protected through layered access controls, monitoring, and encryption standards designed to prevent unauthorized access and service disruption.

Control DomainSecurity ObjectiveImplemented Measure
Identity & Access ManagementEliminate credential-based server compromisePassword-based server login disabled; SSH key-based authentication only
Access GovernanceEnsure controlled and time-bound privileged accessSSH key access managed through authorization workflow with automatic revocation
Monitoring & OversightEnsure visibility of privileged accessSecurity Officer notified of every successful server login
Threat DetectionDetect brute-force or malicious access attemptsFailed login attempts continuously monitored and analyzed
Change Management & AccountabilityEnsure traceability of infrastructure changesLogging of service-level actions (start, stop, reload, restart) including initiating user
Network SecurityRestrict unauthorized network accessDual firewall architecture (server-level + hosting provider firewall)
Attack MitigationBlock brute-force and unauthorized access attemptsFirewall rules actively block repeated failed login attempts and suspicious activity
Data Protection in TransitProtect confidentiality and integrity of dataRSA 4096-bit TLS 1.3 encryption for all server-user communication
Secure IntegrationProtect third-party communication channelsAll external integrations operate exclusively over encrypted channels

Organizational & Process Security Controls

Eurekos applies structured operational and governance controls to protect data, manage risk, and ensure resilience—covering monitoring, access management, third-party security, and data protection practices.

Control DomainSecurity ObjectiveImplemented Measure
Vulnerability ManagementIdentify and remediate system weaknessesWeekly vulnerability scans reviewed and evaluated by the Security Officer
Operational MonitoringDetect infrastructure instability or abnormal behaviorAutomated alerts for downtime, high CPU/RAM usage, low disk space, and increased error rates
Patch & Update ManagementReduce exposure to known vulnerabilitiesContinuous updates of system core and contributed modules
Privileged Access ManagementMinimize super-admin exposureOnly one platform user holds super administrator permissions
Credential GovernanceReduce risk of credential compromiseAutomatic daily rotation of production administrator passwords
Multi-Factor AuthenticationStrengthen access protection for critical systems2FA enforced for hosting and integrated services
Third-Party Risk ManagementEnsure secure external integrationsAll third-party services assessed and approved by the Security Officer prior to integration
Business ContinuityEnsure secure recovery during hardware failureMaster access credentials stored securely in cloud environment with strong password and 2FA
Endpoint SecurityProtect user devices and workstationsMandatory firewall, disk encryption, and password lock on all systems
Least Privilege & TrainingPrevent misuse of administrative utilitiesSystem tools restricted to trained and authorized personnel only
Data Protection & ResilienceProtect stored data and ensure recoverabilityBackups stored in two physical locations; volumes encrypted at rest using LUKS with Eurekos-managed keys

Threat Intelligence

Eurekos maintains continuous oversight of the evolving threat landscape through operational monitoring, external intelligence sources, and structured governance processes:

  • Emerging threats are identified through daily technical monitoring, input from security networks and interest groups, and automated detection services that flag suspicious behavior or anomaly patterns. These insights are analyzed to assess potential client impact and broader risk trends
  • Third-party vendors and infrastructure providers deliver continuous updates, patches, and severity assessments. All advisories are reviewed daily, with mitigation actions prioritized and executed based on formal risk evaluation
  • Eurekos collaborates with clients and their IT departments when relevant, sharing intelligence and aligning responses to changes in the threat environment
  • Quarterly reviews consolidate monthly security activities, enabling strategic resource allocation and mid- to long-term mitigation planning. Oversight and prioritization are governed by the Information Security Steering Group (ISSG)

Independent security partners conduct regular penetration testing, providing recommendations aligned with current best practices and contemporary threat levels—ensuring ongoing security maturity and resilience.

Mobile App

The Eurekos Mobile App is fully integrated with the Eurekos Platform and derives all data and access from the same underlying services. As a result, the organizational and technical security controls established for the platform also apply to the mobile app.

In addition, the following security and operational measures are in place:

  • Secure data transmission–All communication between the mobile app and Eurekos servers is encrypted using TLS 1.3 with RSA 4096-bit certificates
  • Initial authentication requirements–The first login requires an active internet connection to authenticate the user against the Eurekos Platform
  • Authentication and MFA–Initial login to the mobile app mirrors the platform’s authentication configuration, including support for multi-factor authentication (MFA)
  • Biometric authentication–Biometric login (Face ID / Touch ID) can be enabled within the app and requires a successful standard login before activation
  • Access revocation–When a user is removed from the Eurekos Platform, access to the mobileapp is revoked upon the next synchronization when the device is online
  • Local data storage and device security–Encryption of locally stored data on the device (such as downloaded courses or pages) depends on the security configuration of the individual device
  • Secure development framework–The mobile app is developed using Flutter, enabling a single, secure codebase compiled separately for Android and iOS. We use Secure Data Storage to store sensitive data
  • Secure development and monitoring–Aikido is used to support secure development practices and continuous security monitoring, including detection of vulnerabilities and security issues across the application lifecycle
  • Application management and monitoring (Android)–Firebase Console is used to manage applications, team access, and security rules during development and distribution via Google Play, including app performance monitoring and crash reporting
  • Application management and monitoring (iOS)–Xcode and the Apple Developer Program are used for iOS publishing, app performance monitoring, and crash reporting
  • Distribution platforms–The app is distributed through the Google Play Store and Apple AppStore, using official SDKs and compliance requirements.
  • Code signing and integrity–API keys and signing credentials are securely stored in Codemagic, ensuring application signing and preventing unauthorized code modifications
  • Vulnerability management–Automated vulnerability scans are performed daily. Reports are reviewed and evaluated by the Security Officer, and remediation actions are tracked as required

Trust and Security Measures