Security Standards
How we protect the confidentiality, integrity, and availability of client data and systems.
At WIM Solution Sdn. Bhd., security is not an afterthought — it is an integral part of how we design, build, and operate technology solutions. This page outlines the security principles and practices we apply across our internal operations and client service delivery. Last reviewed: 22 May 2026.
Our Security Pillars
Six core commitments that underpin every engagement and internal system we run.
Data Confidentiality
All client data handled during engagements is treated as strictly confidential. Access is limited to personnel with a verified need, and data is never shared with unauthorised parties.
Integrity & Reliability
We maintain rigorous change management and testing protocols to ensure software and systems behave predictably and data remains accurate throughout the project lifecycle.
Availability
Our infrastructure deployments are designed with redundancy and failover in mind, minimising single points of failure and ensuring business continuity for clients.
Access Control
We enforce the principle of least privilege across all internal systems and client environments. Role-based access, multi-factor authentication, and audit logging are standard practice.
Vulnerability Management
We conduct regular vulnerability assessments on our own infrastructure and apply security patches promptly. Client systems we manage are subject to scheduled review cycles.
Audit & Compliance
Project deliverables and managed services are subject to documented audit trails. We support clients in meeting compliance obligations relevant to their industry.
Network & Infrastructure Security
- All internet-facing services are protected by firewalls with explicit allowlist rules
- Network segmentation is applied to separate critical systems from general traffic
- Encrypted VPN tunnels are used for remote access to client and internal environments
- CCTV and access control systems deployed for clients are configured to industry best practice, with footage stored securely and accessible only to authorised personnel
- Wi-Fi deployments use WPA3 or WPA2-Enterprise authentication with SSID isolation where applicable
- Default credentials are replaced on all deployed hardware before handover
Software Development Security
- We follow the OWASP Top 10 as a baseline for web application security
- Input validation and output encoding are applied to prevent injection attacks (SQL, XSS, CSRF)
- Authentication systems use industry-standard hashing (bcrypt / Argon2) — passwords are never stored in plain text
- Role-based access control (RBAC) is implemented by default in multi-user applications
- Third-party dependencies are reviewed for known CVEs before inclusion in projects
- Source code is maintained in version-controlled repositories with commit signing and protected branches
- Production deployments follow a structured release process with pre-deployment testing
Data Protection
- All data in transit is encrypted using TLS 1.2 or higher (HTTPS enforced)
- Sensitive data at rest is encrypted using AES-256 or equivalent
- Client data is stored in clearly defined environments; test environments never use real production data
- Data access logs are maintained and reviewed periodically
- Data handling practices comply with the Personal Data Protection Act 2010 (PDPA) of Malaysia
Endpoint & Internal Operations Security
- All WIM-issued devices run up-to-date endpoint protection software
- Multi-factor authentication (MFA) is enforced for all internal tools and cloud services
- Operating systems and software are kept current with security patches
- Full-disk encryption is enabled on all company laptops and workstations
- Personnel undergo security awareness training to recognise phishing, social engineering, and safe data handling
Incident Response
WIM maintains an incident response procedure for security events affecting our systems or client environments. In the event of a confirmed security incident:
- Affected systems are isolated and assessed within the first hour of detection
- Relevant clients are notified as soon as the scope is understood, and no later than 72 hours after confirmation
- Root cause analysis and remediation steps are documented and shared with affected parties
- Post-incident reviews are conducted to prevent recurrence
Supply Chain & Vendor Security
We evaluate third-party tools, cloud providers, and subcontractors before use. Key controls include:
- Vendors handling client data must demonstrate compliance with PDPA or equivalent
- Open-source software is assessed for licence compliance and active maintenance
- Cloud services are configured with least-privilege IAM policies and MFA on all administrative accounts
- Vendor access to client environments is time-limited and revoked upon project completion
Physical Security
- Our office premises are secured with controlled access and CCTV monitoring
- Physical media containing client data is handled under clear chain-of-custody procedures
- Decommissioned hardware is securely wiped (NIST 800-88 guidelines) before disposal or re-use
Responsible Disclosure
If you discover a potential security vulnerability in any of our systems or client-facing platforms managed by WIM, we encourage responsible disclosure. Please report it promptly and in confidence to:
WIM Solution Sdn. Bhd. — Security Team
Email: hello@wimsolution.com
Please include: affected system, a description of the vulnerability, steps to reproduce, and your contact details. We will acknowledge receipt within 2 business days and aim to resolve critical issues within 30 days.
We ask that you do not publicly disclose the vulnerability until we have had a reasonable opportunity to investigate and remediate.
Continuous Improvement
Our security posture is reviewed and updated regularly. We monitor industry developments, threat intelligence sources, and regulatory changes to ensure our practices remain effective and appropriate. This document is reviewed at minimum annually, or after any significant security incident.
Security Questions?
If you have questions about how WIM handles security in your project or on client systems we manage, speak with our technical team directly.
Contact Us