Data Hosting and Security
At ATZ CRM, we take data security seriously. Our platform is built on enterprise-grade infrastructure with robust security protocols and clear data policies — all tailored for the unique needs of recruitment, HR and staffing teams.
"Recruitment data, protected like financial data."
ATZ CRM is built with the same engineering precision you'd expect from high-stakes industries. With deep technical expertise behind the platform, we ensure your data is secured with robust protocols designed to withstand real-world threats.
Infrastructure Security Compliance
ATZ CRM is built on the secure backbone of Google Cloud Platform (GCP) and Amazon Web Services (AWS), both trusted by enterprises globally for their stringent security standards. With certifications including ISO 27001, SOC 2 Type II, and more, our infrastructure partners provide a compliant foundation — and we extend that protection by implementing best-in-class security practices across our own systems.
Quick Navigation
Security-First Infrastructure
ATZ CRM runs on Google Cloud Platform (GCP), leveraging a Zero Trust security model and Google’s secure-by-design infrastructure. From data centers to applications, we implement a multi-layered defense strategy to ensure your recruitment data remains private, secure, and fully protected across every layer of our stack.
Layered Security Controls
We follow a Defense-in-Depth model — applying multiple safeguards across the infrastructure, network, and application layers.
Minimal Access, Maximum Control
Based on the Principle of Least Privilege, every system and employee is granted access only to what’s essential — reducing exposure risk at every level.
Network Isolation by Design
Critical infrastructure is protected using network segmentation with strict firewall rules and clearly defined security zones.
Multi-Factor Authentication (MFA)
Mandatory MFA is enforced for all admin-level system access, ensuring only verified identities can reach sensitive systems.
Our infrastructure is continuously monitored and routinely tested. We partner with independent security firms to conduct vulnerability assessments and penetration testing, helping us maintain a proactive security posture and adapt to emerging threats.
Data Storage & Resilience
ATZ CRM uses a multi-region, highly redundant storage architecture to ensure your data is always available, secure, and compliant with regional data regulations.
Primary Data Center
AWS North Virginia (us-east-1) — Our primary data center where all customer data is hosted and distributed across multiple availability zones to ensure high performance, uptime, and fault tolerance.
All data is encrypted at rest and in transit, with full compliance to industry security standards and regional regulatory requirements.
N+2 redundancy, 99.99% uptime SLA, automated failover, continuous security monitoring
Secondary Data Center
AWS London (eu-west-2) — Our secondary disaster recovery site where real-time data replication from North Virginia ensures continuous availability and minimal service interruption in the event of a failure.
This dual-region setup guarantees robust business continuity, fast recovery, and enhanced disaster resilience.
Recovery metrics: RTO < 4 hours, RPO < 15 minutes, automated failover testing performed monthly
🧬 Data Replication & Redundancy
North Virginia Primary
London Secondary
We employ synchronous replication for all critical data between our primary data center in North Virginia and our secondary data center in London. This ensures real-time data consistency and eliminates any single point of failure. Every database operation is securely logged and replicated instantly across both regions, maintaining full data integrity and ensuring that failover systems remain fully up to date. This architecture supports seamless disaster recovery, high availability, and enterprise-grade resilience for all users.
Data Protection Measures
Backup & Recovery Strategy
At ATZ CRM, we leverage AWS to deploy, monitor, and back up our database infrastructure with enterprise-grade reliability. Our backup strategy is designed for resilience, precision, and rapid recovery across global regions.
Key elements include:
- Continuous incremental backups at 15-minute intervals
- Daily full snapshots with automated integrity checks
- Point-in-Time recovery with 5-minute granularity
- Automated backup verification and validation
- Geo-redundant storage across both North Virginia and London regions
- Automated backup validation and consistency verification
- Rapid restoration procedures with full documentation
- Monthly disaster recovery simulations to ensure readiness
Our recovery protocols are aligned with our SLA-defined timeframes, enabling fast, consistent service restoration even under failure scenarios.
Security Controls & Encryption
ATZ CRM implements a multi-layered security framework to protect customer data across all stages of storage and transmission.
- AES-256 encryption for all data at rest
- TLS 1.3 encryption for all data in transit between services and regions
- Encryption key lifecycle management with automatic rotation
- Role-Based Access Control (RBAC) for fine-grained permissioning
- Strict least-privilege access policies enforced across all environments
- Regular penetration testing and security audits
- Continuous monitoring with 24/7 threat alerts
- Integrated DDoS protection and Web Application Firewall (WAF)
- Secure CI/CD workflows with static code analysis and vulnerability scanning
Our infrastructure and security practices are regularly reviewed and audited to maintain compliance with global standards. These certifications reflect our ongoing commitment to safeguarding your data with the highest levels of trust and transparency.
Vulnerability Management
Automated scanning, real-time risk scoring, and tracked remediation ensure prompt resolution of security vulnerabilities across all systems.
Intrusion Detection
24/7 monitoring with automated alerts and threat response to detect and contain suspicious activity immediately.
Identity Management
Centralized authentication with MFA and strict RBAC ensures secure, limited access based on user roles.
Data Retention Policy
We balance customer business needs with regulatory compliance, following data minimization principles. Our retention timelines and deletion processes are clearly defined, ensuring transparent and secure data lifecycle management.
Active Accounts
Unlimited
All data retained while account is active
Deactivated Accounts
30 Days
Data retained in recoverable state
Terminated Accounts
30 Days in Backups
Automatically purged after backup rotation
Account Termination Process
When an account is closed, we follow a defined procedure to ensure secure and complete data removal:
- Instant logical removal of all customer data from active production environments
- Data remains in secured, encrypted backups for a 30-day retention window
- Upon backup expiration, all residual data is permanently erased
- Deletion confirmation can be issued upon customer request
Custom Retention Policies
For enterprise clients with unique compliance or regulatory needs, we provide customizable data retention options, including:
GDPR & Data Privacy Compliance
ATZ CRM is built with a privacy-first architecture. Our system equips your team with the tools needed to comply with GDPR standards while giving you complete visibility and control over candidate and contact data.
Data Subject Rights Management
Our system offers prebuilt flows to process GDPR data requests effectively, helping you respond within required legal timeframes.
- Access to stored personal data
- Correction of inaccurate data
- Deletion of personal records (right to be forgotten)
- Limiting how data is processed
- Exporting data for transfer
Each request is recorded, tracked, and auditable to ensure compliance is met at every step.
Consent Collection & Tracking
Our consent system is designed to help you stay compliant by allowing easy capture, storage, and monitoring of user permissions in accordance with GDPR.
- Full version history and timestamping of changes
- Automated purge of data when consent is revoked
Data Processing Transparency
As a data processor, ATZ CRM equips you with the necessary features to implement and support your internal GDPR compliance strategies. Our platform includes:
Processing Activity Logs
Easily maintain a detailed log of all personal data processing activities, aligning with the requirements of GDPR Article 30.
Incident Response & Breach Reporting
Integrated systems to monitor, assess, and notify relevant stakeholders of data breaches within mandated timeframes.
International Data Transfer Controls
Safeguards and documentation support for cross-border data transfers in line with Chapter V of the GDPR.
Note: While ATZ CRM provides robust features to support GDPR compliance, your organization is responsible for defining the legal basis for processing and ensuring all data usage complies with applicable laws. We recommend consulting your legal counsel or DPO to align your use of ATZ CRM with your regulatory obligations.
💬 Contact Our Security Team
Security Inquiries
If you have questions about our security practices or need to discuss specific compliance or technical requirements, please reach out to our security team at:
support@atzcrm.com →Responsible Disclosure
We appreciate the efforts of security researchers. If you discover a potential vulnerability within our platform, please report it responsibly through our disclosure process:
support@atzcrm.com →Your Data Security is Our Priority
Join hundreds of organizations that trust Recruitly with their sensitive recruitment data. Our enterprise-grade security keeps your information safe while our compliance-ready platform helps you meet your regulatory obligations.