SECURITY & COMPLIANCE
Enterprise-Grade Security Infrastructure
At Investigative Risk Management, security is foundational to everything we do. When you trust us with sensitive investigations and services, you're entrusting us with your most critical information.
Cloud-First Security Architecture
Our Approach:
IRM operates on a fully cloud-based, managed technology stack. We intentionally chose cloud-first architecture to leverage enterprise-grade security infrastructure with independent third-party assurance.
Vendor Selection Criteria:
Every cloud service provider in our technology stack is selected based on:
Independent Security Assurance - SOC 2 Type II certification (or equivalent)
Security Capabilities - Encryption, access controls, logging, monitoring
Compliance Alignment - Canadian privacy and data protection requirements
Resilience & Availability - Uptime commitments and disaster recovery
Audit Rights - Security documentation and audit report availability
Third-Party Assurance:
The cloud services used to store, process, or transmit IRM business and client information maintain SOC 2 Type II reports (or equivalent independent assurance) within the scope of services utilized by IRM.
IRM operates on independently-assured infrastructure. Our cloud service providers maintain SOC 2 Type II certification. IRM's internal security controls and governance practices are documented separately and available for review under NDA.
Security Controls Overview
Our security program incorporates controls aligned to SOC 2 Trust Services Criteria:
Security
Multi-factor authentication (MFA) for administrative and critical system access
Role-based access control with least privilege principles
Managed endpoint protection with encryption on all corporate devices
Formal onboarding/offboarding procedures for access provisioning
Availability
Cloud services with enterprise SLAs (99.9%+ uptime)
Data redundancy and business continuity capabilities
Automated backup of critical systems and client deliverables
24/7 monitoring for critical security services
Confidentiality
TLS 1.2+ encryption for all data in transit
AES-256 encryption for data at rest within cloud platforms
Permission-based sharing with granular access controls
Full-disk encryption on all corporate devices
Processing Integrity
Version control and change tracking for client deliverables
Multi-person review for critical outputs
Cryptographic hashing for forensic evidence verification
Access logging to detect unauthorized modifications
Privacy
Processing aligned with Canadian privacy laws (PIPEDA)
Access limited to authorized personnel with business need
Breach notification procedures per legal requirements
See our [Privacy Policy] for complete details
Vendor Security Governance
Technology Stack Management:
IRM maintains active governance over all cloud service providers:
Security configuration standards applied across platforms
Access control baselines enforced consistently
Logging and monitoring requirements validated
Periodic security reviews of vendor posture and assurance documentation
Vendor risk assessments for new service providers
Transparency Note:
Provider SOC 2 reports apply to the service providers' audited environments. IRM's internal security controls and operational practices are documented separately and available for review under NDA.
IRM does not publicly disclose specific vendor identities. This approach reduces security risk (supply chain targeting, reconnaissance) while supporting thorough procurement review via controlled disclosure.
Security Monitoring & Incident Response
Continuous Monitoring:
Centralized logging across cloud platforms
Security information and event management (SIEM)
Real-time alerting for security events
Regular review of access patterns
Incident Response:
Documented incident response plan
Internal escalation procedures
Client notification aligned with contractual obligations
Post-incident review and improvement
Security Documentation Available
Subject to NDA, IRM can provide:
Information Security Overview - Security program and controls summary
Third-Party Assurance Confirmation - SOC 2 Type II coverage verification (under NDA)
Incident Response Summary - Response capabilities and procedures
Access Control Overview - Authentication and access management controls
Security Questionnaire Responses - Customized responses to vendor assessments
Why Cloud-First Security
IRM's Cloud Advantages:
Enterprise-grade security without capital infrastructure investment
Automatic security updates and patch management
Independent third-party security audits (SOC 2)
High availability and data redundancy built-in
Continuous monitoring and threat detection
Scalable security aligned to business growth
Security Contact
For security inquiries, procurement reviews, or to request documentation:
Contact: https://irmi.ca/contact
Phone: 1 (855) 384-4764
For information about data privacy practices, see our [Privacy Policy]. For service terms and conditions, see our [Terms of Service].