

DataPress architecture and operations align with the UK National Cyber Security Centre's Cloud Security Principles framework. This page demonstrates how our platform meets each of the 14 principles established by the NCSC for secure cloud service provision.
For additional technical details, see our Infrastructure Overview and Security Certification pages.
Data should be adequately protected against tampering and eavesdropping as it transits networks.
All data communications are protected using TLS 1.2+ encryption configured to industry-standard cipher suites aligned with NCSC TLS guidance.
Data and assets should be protected against physical tampering, loss, damage or seizure.
Our infrastructure operates on enterprise-grade cloud hosting with physical security controls managed by our hosting provider. Data resilience is ensured through automated daily backups retained for 7 days. All backups are encrypted by the cloud provider. Service resilience includes automated monitoring and rapid recovery procedures.
Malicious or compromised customers should not be able to access or affect the service or data of others.
DataPress operates as a Software-as-a-Service (SaaS) application where customers cannot execute custom code. Per NCSC guidance, this use case does not require hardware-backed separation mechanisms.
As a SaaS application without custom code execution, application-level separation is appropriate per NCSC guidance. We conduct regular security reviews and penetration testing to validate separation controls.
The service provider should have a security governance framework coordinating management of the service.
The CEO, Tom Rees (tom@datapress.com), holds direct responsibility for security governance and service operations, functioning as the named executive accountable for information security across the platform. As a focused single-product service, this structure ensures rapid decision-making and direct oversight of all security matters.
Services must be operated and managed securely to impede, detect or prevent attacks.
Operational security is maintained through automated vulnerability management, continuous protective monitoring, documented incident response procedures, and configuration management using Infrastructure as Code.
5.1 Vulnerability Management:
Application dependencies are continuously monitored using Snyk, which automatically scans for vulnerabilities in Node.js packages and third-party libraries. Security patches are prioritized based on severity:
Operating system security updates are applied automatically on the DigitalOcean droplet. PostgreSQL and MySQL receive periodic security patching as part of scheduled maintenance cycles. Infrastructure renewal procedures ensure systems remain within supported versions.
5.2 Protective Monitoring:
Security monitoring operates at multiple layers:
5.3 Incident Management:
Our Business Continuity Plan provides the framework for incident response. Standard response approaches for common incident types include:
Security incidents and vulnerabilities can be reported to admin@datapress.com.
5.4 Configuration and Change Management:
All application code is managed in Git version control. Changes undergo local testing before deployment. Infrastructure configuration is maintained as Infrastructure as Code, providing version control for infrastructure components and enabling consistent, auditable deployments.
Configuration drift is prevented through immutable infrastructure practices. Service changes affecting customer usage are communicated directly to affected customers with appropriate notice.
Service provider personnel with access to customer data and systems require high trustworthiness.
6.1 Personnel and Security Culture:
DataPress operates with minimal personnel risk. System administration is performed exclusively by the named CEO who has undergone identity verification and professional background checks appropriate to the role, including prior government sector employment. Operational continuity over fourteen years demonstrates sustained trustworthiness.
The single-administrator model significantly reduces insider risk compared to larger team structures, eliminating the complexity of managing multiple privileged users.
6.2 Technical Controls for Service Administration:
Administrative access is controlled through multi-factor authentication on critical systems (DigitalOcean infrastructure, GitHub, Snyk) and SSH key-based authentication with passphrase protection. All SSH access and code commits are logged.
As a content management system, routine access to customer data is necessary for service operation, development, and customer support. Access is purpose-limited to these operational requirements.
Administrative activity is monitored through system logs and deployment tracking. The single-administrator architecture ensures clear accountability for all system changes.
Services should be designed, developed and deployed to minimize and mitigate security threats.
DataPress follows secure development practices appropriate to a focused SaaS platform, balancing security rigor with operational efficiency.
Development Lifecycle:
Code changes progress through local development with Git version control, followed by automated build and deployment processes. All deployments execute a comprehensive automated test suite including API correctness validation before deployment. Green/blue deployment ensures atomic service updates with rollback capability.
Staging environments are utilized for significant changes requiring customer validation before production deployment.
Supply Chain Management:
Third-party dependencies are actively managed through:
Security Testing:
Security validation includes:
Configuration Management:
Application secrets and credentials are managed through environment variables, isolated from source code. Configuration is maintained separately from application code with appropriate access controls.
Production Environment Separation:
Production infrastructure is logically separated from development environments. Deployment processes enforce consistency through automated builds and testing gates before production release.
Supply chain should meet the same security standards as the organization sets for itself.
DataPress infrastructure relies on established third-party providers with appropriate security controls. Customer data flows and supplier responsibilities are clearly defined.
Third-Party Data Access:
Customer data is accessible to the following third parties as part of service operation:
Third-party services that do not access customer data include: Snyk (code vulnerability scanning), BetterStack (public endpoint monitoring), and GitHub (source code repository).
Shared Responsibility Model:
Security responsibilities are divided between DataPress and infrastructure providers according to our documented shared responsibility model. Cloud providers maintain physical security, infrastructure security, and compliance certifications. DataPress maintains application security, access controls, and incident response capabilities.
Supply Chain Management:
Supplier security is managed through:
Tools should be available for secure management of service use, preventing unauthorized access.
DataPress implements role-based access control with three user types: administrators, editors, and viewers. Account administrators can assign users to specific datasets with appropriate permission levels, including read-only access for viewers who need visibility without modification rights.
Authentication and User Management:
User authentication utilizes WordPress's built-in authentication system with username/password credentials. Account registration is available through the public web interface. Multi-factor authentication is under development and expected within the next quarter. Single sign-on integration is planned for future implementation.
Session management follows WordPress security standards, including secure session tokens and automatic timeout policies.
Management Interfaces:
Customers manage their DataPress service through:
All access control decisions use the single WordPress-based authorization mechanism, ensuring consistent permission enforcement across the platform.
Provider Access:
DataPress personnel access customer environments through authenticated database connections when providing technical support or resolving service issues, as described in Principle 6.
All access to service interfaces should be constrained to authenticated and authorized identities.
All system access requires username/password authentication with minimum complexity requirements. Sessions automatically expire after 48 hours of inactivity. Password managers are supported through standard browser integration.
Multi-factor authentication is available as a custom implementation for customers with enhanced security requirements. Single sign-on (SSO) integration is planned as part of a comprehensive authentication system modernization scheduled for 2026, which will introduce enterprise-grade identity management capabilities.
Service Identity Authentication:
API credentials are available for programmatic access to DataPress services. Customers can generate and revoke API keys through the web-based management portal. All API authentication occurs over TLS-encrypted channels with certificate validation.
Credential rotation capabilities are under development to support automated lifecycle management of service credentials.
Credential Management:
The user management dashboard enables administrators to quickly add, modify, or remove user access, supporting organizational joiners/movers/leavers processes. User removal immediately revokes all access and invalidates active sessions.
Service Authentication:
All connections to DataPress authenticate the service through TLS certificates managed by Cloudflare, protecting against man-in-the-middle attacks.
External interfaces should be identified and defended appropriately.
DataPress exposes the following internet-facing interfaces:
Database services (PostgreSQL, MySQL) operate on localhost only and are not exposed to external networks.
Interface Protection:
All web traffic routes through Cloudflare's paid tier security services, implementing:
Attack Monitoring:
Cloudflare analytics provide visibility into attack patterns and blocked threats. The combination of WAF rules and behavioral challenges has proven effective against volume-based attacks and automated credential stuffing attempts commonly observed in our threat landscape.
Infrastructure management occurs through DigitalOcean's authenticated web console with multi-factor authentication enabled.
Administration systems should follow enterprise good practice, recognizing their high value to attackers.
DataPress administrative access is restricted to a single authorized administrator (CEO), eliminating the complexity and insider risks associated with managing multiple privileged users. This single-administrator model provides clear accountability for all system changes and direct oversight of customer support activities.
Administrative Access Controls:
Administrative infrastructure access requires SSH key-based authentication with passphrase protection. The administrative workstation uses biometric authentication (Touch ID) for device access. All administrative access occurs from a dedicated MacBook Pro used exclusively for service operations.
Customer data access for support purposes occurs through authenticated SSH tunnels to database services. As a single-administrator operation, formal approval workflows are not applicable - all administrative actions are performed by the accountable CEO.
Audit and Change Management:
Administrative activity is tracked through multiple mechanisms:
Customers should be able to identify security incidents and understand how they occurred.
13.1 Audit Information for Customers:
DataPress provides comprehensive audit trails for content and data operations:
Audit logs are available through the web interface with browsing and search capabilities. Customers can export audit data in CSV format for external analysis or archival purposes.
Retention and Immutability:
Audit logs are retained within the customer's database for the duration of their service subscription. Audit records are immutable - customers cannot modify or delete audit entries, ensuring integrity for forensic investigations.
13.2 Security Alerts:
DataPress does not currently provide automated security alerting to customers. Security concerns or suspected incidents should be reported to admin@datapress.com for investigation.
Customers are encouraged to monitor their audit logs for unusual patterns and can implement their own alerting based on exported audit data.
Cloud providers should help customers meet their data protection responsibilities through secure by design services.
14.1 Security by Design and Default:
DataPress implements security by design through a managed SaaS architecture where security controls are configured and maintained by the service provider rather than requiring customer security expertise.
Default Secure Configuration:
New customer accounts are immediately operational with secure defaults:
Continuous Security Improvements:
Security enhancements are deployed to all customers automatically. When new protective measures are implemented (such as enhanced WAF rules or security patches), they are rolled out across the entire platform, ensuring all customers benefit from improved defenses without requiring action on their part.
For specific technical implementation details or additional compliance documentation, please contact our team at support@datapress.com.