Security review
Material to support your security team’s review.
Architecture summary
Section titled “Architecture summary”Blue Light Maps is deployed either:
- On-prem within your service’s perimeter — the routing engine, data store, and integration endpoints all run on infrastructure you control.
- Hosted enclave — a dedicated, single-tenant deployment we operate. Each service’s data is logically and physically isolated from every other service’s.
Data flows
Section titled “Data flows”Per-responder telemetry (position, status, route choices) flows from cab → on-prem/enclave only. No responder data ever transits the public internet to a multi-tenant cloud.
Authentication
Section titled “Authentication”Single sign-on via your existing identity provider (Azure AD, Okta, Entra ID). MFA enforced by your IdP. Per-role access control configured by your IT team.
Penetration testing
Section titled “Penetration testing”Annual third-party pentest. Reports available under NDA on request.
Incident response
Section titled “Incident response”24/7 customer-support hotline for deployed services. Incident response SLA tiered by severity, documented in the service contract.