All Collections
Questions on Security, Reliability, Data Protection, and Integration
How is vulnerability, patch, and security updates management ensured?
Are the network connections and interfaces to legal-i established and do they meet the required performance and security features?
How do technical administrators at legal-i access the infrastructure and systems? What methods are used for this purpose?
How can it be ensured that only authorized devices can access the service (e.g., customer IDP, IP whitelisting)?
Does legal-i have a requirements-compliant security monitoring system with defined interfaces (e.g., APIs, etc.), and is security incident reporting ensured according to customer requirements?
Are additional extensions or plugins used?
How are endpoints mutually authenticated in machine-to-machine communication?
How is malware protection ensured?
How does key management work?
How is the tenant service ensured?
At which service provider does legal-i operate its infrastructure?
What certifications and evidence documentation for attesting security are available?
Specification of RTO and RPO
How is authentication and authorization accomplished?
Is it ensured that no licensing rights are violated by using the cloud service?
How does legal-i ensure identity management and authentication?
Multi-tenant architecture: What does it mean?
How does the architecture of the legal-i cloud platform look?
How do we ensure security in the data center?
How are security controls ensured?
What does legal-i's cloud infrastructure look like?
How is the separation of customer workspaces ensured?
Is there a mandatory archiving requirement for outsourced data? If so, what is the retention period and in what form must the data be stored?
How does legal-i ensure data protection?
How is the data encrypted?
Is the service (including data processing and storage) provided in a country with sufficient data protection? If so, in which country?
How is data backup handled at legal-i?
Who is the contracting party?
Can the application (including administration) be fully utilized through a browser? Which browsers are supported?
What does the integration of legal-i look like after a successful pilot project?
Are connections to other systems necessary? If yes, which systems and using which protocols?
What are the contractual agreements with legal-i?
Can the IAM system of a customer be used by legal-i for the central management of accounts, roles, and permissions?