Jit logo
Platform
Platform & Use Cases Overview
Integrations
Core Product Security Workflow Automation
Vulnerability Triage, Prioritization, and Remediation
Shift-left Security for Developers
Full-Stack Product Security Scanning
Compliance Gap Analysis
Beta
Threat Modeling
Beta
Customized Product Security Workflow Automation
Automate Program-Specific Workflows
Solutions
Use Cases
Build an AppSec Program
Achieve Compliance
Simplify Security for Developers
Comparisons
Jit vs Snyk
Jit vs GitHub Advanced Security
Jit vs GitLab Ultimate Security
Jit vs SonarQube
Jit vs Aikido
Organization Type
Startups
Enterprises
Partners
Pricing
Company
About Us
Partners
Careers
Events
Customers
Learn
All Resources
Blog
Documentation
Resources
DevSecOps:
Practices & Implementation
Application Security Tools:
Selection & Guidance
Cloud Security Tools:
Best Practices & Use Cases
Security Standards:
What to Know & Apply
Application Security:
Strategies & Essentials
OWASP ZAP:
Setup & Best Practices
LoginStart FreeBook a demo

Welcome to Jit’s Legal Page

Here you will find the terms and conditions that apply directly to you and the solutions you purchase. You will also find links to information about Jit’s data privacy and security program, along with data privacy terms.

Back

Information Security Policy

Last updated:
May 1, 2025
Version:
2.0

1. Purpose and Scope

Jit is committed to protecting the confidentiality, integrity, and availability of all physical and electronic information assets to ensure that regulatory, operational, and contractual requirements are fulfilled. This policy defines the security controls and principles that all personnel and systems must adhere to.

This policy applies to:

  • All information created, received, stored, or transmitted by Jit
  • All information systems, applications, and networks owned or managed by Jit
  • All employees, contractors, consultants, temporary staff, and other workers at Jit
  • All third parties that connect to or access Jit systems

2. Related Policies

This Information Security Policy serves as the foundation for Jit's comprehensive Information Security Program. The following subordinate policies provide detailed requirements for specific areas:

Governance and Risk

  • Information Security Governance Policy
  • Risk Assessment Policy
  • Third Party Risk Management Policy
  • Responsible Disclosure Policy

Data Protection and Access

  • Data Classification Policy
  • Data Protection Policy
  • Privacy Policy  
  • Encryption Policy
  • Data Retention Policy
  • Access Control Policy
  • Password Policy
  • AI Usage Policy
  • SaaS Usage Policy

Infrastructure and Operations

  • Asset Management Policy
  • Change Management Policy
  • Configuration Management Policy
  • Network Security Policy
  • Cloud Security Policy
  • Vulnerability Management Policy
  • Logging and Monitoring Policy

Business Continuity

  • Business Continuity Policy
  • Disaster Recovery Policy
  • Backup and Recovery Policy
  • Incident Response Policy

End User and Physical Security

  • Acceptable Use Policy
  • Mobile Device Policy
  • Remote Work Policy
  • Clean Desk Policy
  • Physical Security Policy
  • Visitor Management Policy
  • Code of Conduct

Application and Development

  • Secure Development and Application Security Policy

Each supporting policy adheres to the principles established in this Information Security Policy while providing detailed controls and procedures for its specific domain. Supporting procedures, standards, and guidelines may exist for each policy to provide implementation guidance.

3. Information Security Principles

Jit implements information security based on fundamental principles providing comprehensive protection of information assets. The organization commits to maintaining these six fundamental security objectives through documented controls and regular assessment.

Security objectives include:

  • Confidentiality: Protection against unauthorized information disclosure
  • Possession/Control: Maintenance of control over information assets
  • Integrity: Prevention of unauthorized modification
  • Authenticity: Validation of information origin and legitimacy
  • Availability: Ensuring timely access for authorized users
  • Utility: Maintaining information usability and relevance

4. Governance

Jit establishes clear ownership and accountability for information security through a comprehensive governance structure. The organization commits to regular review and updates of security policies, standards, and procedures.

Governance structure includes:

  • Board level oversight and strategic direction
  • Executive management responsibility and accountability
  • Dedicated information security personnel
  • Clear roles and responsibilities
  • Independent assessment and audit functions
  • Regular policy review and updates
  • Documented exception management process

5. Risk Management

Jit implements a comprehensive risk management program aligned with National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), and the American Institute of Certified Public Accountants (AICPA) System and Organization Controls (SOC) 2 Trust Services Criteria. The organization commits to regular risk assessments and maintaining appropriate controls based on risk levels.

Risk management activities include:

  • Annual enterprise risk assessments
  • System-specific risk analyses
  • Third-party risk assessments
  • Risk treatment planning
  • Continuous monitoring of risk levels
  • Regular control effectiveness reviews
  • Risk-based decision making processes

6. Operational Requirements

Jit implements controls aligned with the Center for Internet Security (CIS) Critical Security Controls, National Institute of Standards and Technology (NIST) Special Publication 800-53, and the American Institute of Certified Public Accountants (AICPA) System and Organization Controls (SOC) 2 Trust Services Criteria. The organization maintains a defense-in-depth approach to security and commits to implementing and maintaining controls across all critical security domains.

6.1 Asset Management

The organization maintains complete inventory and control of hardware and software assets.

Control categories include:

  • Enterprise Asset Management
  • Software Asset Management
  • Data Management and Protection
  • Configuration Management
  • Secure Asset Disposal

6.2 Access Control

The organization implements the principle of least privilege and need-to-know access.

Control categories include:

  • Access Control Management
  • Account Management
  • Privilege Management
  • Remote Access Control
  • Identity and Authentication
  • Session Management

6.3 Data Protection

The organization protects data throughout its lifecycle based on classification and sensitivity.

Control categories include:

  • Data Classification
  • Encryption and Key Management
  • Data Loss Prevention
  • Media Protection
  • Information Privacy
  • Secure Data Destruction

6.4 Network, Cloud Security and SaaS

The organization implements comprehensive security controls across all network infrastructure, cloud services, and interconnected environments. This includes protection of both traditional network boundaries and cloud-based resources through defense-in-depth strategies.

Control categories include:

  • Network Architecture and Design
  • Access Control and Authentication
  • Perimeter Security
  • Communication Security
  • Service Provider Security
  • Cloud Infrastructure Protection
  • Application Security
  • Data Transport Security
  • Network Monitoring and Analytics
  • Remote Access Security

6.5 Operational Security

The organization maintains secure operational practices across all technology environments, emphasizing standardization, automation, and continuous validation of security controls.

Control categories include:

  • Change Control
  • Configuration Management
  • Security Engineering
  • Application Lifecycle Security
  • Platform Security
  • Operational Monitoring
  • Technical Vulnerability Management
  • Environmental Security
  • Resource Management
  • Security Automation

6.6 Incident Management

The organization maintains capabilities to detect, respond to, and recover from security incidents.

Control categories include:

  • Security Monitoring
  • Incident Detection
  • Incident Response
  • Digital Forensics
  • Communications Management
  • Continuous Improvement

6.7 Business Continuity

The organization ensures resilience and recovery capabilities for critical systems and processes.

Control categories include:

  • Business Impact Analysis
  • Continuity Planning
  • Disaster Recovery
  • Backup Management
  • Crisis Management
  • Recovery Testing

7. Compliance and Auditing

Jit maintains compliance with applicable regulations and standards through regular assessment and auditing. The organization commits to maintaining certifications and addressing audit findings promptly.

Compliance activities include:

  • Regular compliance assessments
  • Independent audits
  • Control testing
  • Gap remediation
  • Evidence collection
  • Regulatory reporting
  • Certification maintenance

8. Training and Awareness

Jit maintains a comprehensive security awareness and training program. The organization commits to ensuring all personnel understand their security responsibilities and receive appropriate training.

Program elements include:

  • New hire security training
  • Annual awareness training
  • Role-specific security training
  • Security communications
  • Awareness campaigns
  • Compliance training
  • Performance measurement

9. Enforcement

Jit enforces this policy through technical controls, monitoring, and a disciplinary process. The organization commits to investigating and addressing all policy violations.

Enforcement measures include:

  • Technical enforcement controls
  • Regular compliance monitoring
  • Violation reporting procedures
  • Investigation processes
  • Disciplinary procedures
  • Corrective actions
  • Appeals process

10. Policy Management

This policy will be reviewed annually and updated as needed to reflect changes in business requirements, technology, and compliance obligations.

Document Control:

  • Policy Owner: Chief Information Security Officer
  • Next Review Date: January 30, 2026
Jit logo

Platform

How Jit WorksSecurity ToolsIntegrationsJit vs. SnykUser Stories

Company

About UsPartnersCareersEventsNews

Resources

BlogDocsPricingCustomers
Contact usBook a DemoStart Free
TwitterLinkedinFacebook
Read Jit reviews on G2
SOC 2 Type 2AWS partner badge
2025 © Jit | All Rights Reserved
Legal and SecurityModern Slavery Act

100 Summer Street
Boston, MA, 02110
USA