Security in Project and Program Management

Cora ensures enterprise-grade security for government agencies and organizations, integrating compliance, encryption, and continuous monitoring to protect project data and maintain regulatory standards while reducing risk exposure. 

 

Capabilities

pink and purple icon with FR in a circle

FedRAMP Ready

Cora has undergone a preliminary FedRAMP assessment, passing an initial security review and positioning itself for full FedRAMP authorization. This designation demonstrates compliance readiness, ensuring that Cora meets federal cybersecurity standards for cloud-based project and program management. 

SOC in pink and purple text in a seucirty badge

SOC 2 Type 2 Compliant

Cora adheres to SOC 2 Type 2 security controls, ensuring compliance with industry standards for security, availability, processing integrity, confidentiality, and privacy. A third-party auditor verifies that Cora maintains robust security measures aligned with AICPA’s Trust Services Criteria (TSC) for continuous risk management. 

pink and purple icon with 24/7 in a rotation

24/7 Audit Readiness

Cora maintains real-time compliance monitoring to ensure security controls, policies, and documentation align with regulatory requirements. Automated security checks, continuous audits, and proactive risk assessments keep Cora always audit-ready, supporting rapid response to compliance inquiries and security reviews. 

Purple and pink icon of document with a checklist

IT Policy Compliance

Cora enforces IT security policies across all systems, aligning with ISO 27001, Cyber Essentials and Cyber Essentials Plus certifications. Regular security assessments ensure adherence to government and enterprise IT standards, reducing vulnerabilities and maintaining secure system configurations. 

Pink and purple icon of a warning sign.

Cyber Vigilance

Cora implements continuous threat monitoring, phishing protection, and malware defence to safeguard digital assets. Employees undergo mandatory security training covering cybersecurity threats such as data breaches, CEO fraud, and two-factor authentication (2FA), ensuring an adaptive security posture that evolves with the threat landscape. 

Pink and purple icon of a cybersecurity.

Data Encryption

Cora PPM infrastructure ensures end-to-end encryption for all project data, securing information both at rest and in transit. Using AES-256 encryption, Cora protects sensitive project and government data from unauthorized access, maintaining regulatory compliance and safeguarding operational integrity. 

Want to See Cora in Action?

Cora PPM Software Laptop and Mobile Image

Cora Security FAQs 

What kind of audit logs are maintained?

Cora keeps detailed logs of all relevant system activities, access controls, and security events, ensuring comprehensive audit trails are always available. Activities are date and time stamped giving you a full audit history.  

How do you keep your employees informed about security threats?

Cora provides mandatory security training throughout the year, covering a broad range of security topics. This training is updated regularly to address the latest threats. 

What security certifications and compliance standards do you adhere to?

Cora adheres to SOC 1, SOC 2 Type 2, Cyber Essentials, Cyber Essentials Plus which we hold certification for and we also align with ISO 27001 security controls, ensuring compliance with industry standards for security, availability, processing integrity, confidentiality, and privacy 

Is sensitive data encrypted at rest and in transit?

Cora encrypts all sensitive data in transit using TLS 1.2 at minimum with common secure ciphers and encrypts data at rest using AES-256. 

How are user devices configured and secured?

Cora uses an MDM solution to enforce antivirus, local firewall, disk encryption, auto updates, screen timeout, and to remotely lock and wipe devices that are lost or stolen.