Skip to main content

Pre-Implementation Guide for IT Teams

Essential technical and security information needed to evaluate Smart Access for your organization. Whether preparing for a pilot or full deployment, this article covers architecture, security compliance, and common vendor onboarding requirements.

John White avatar
Written by John White
Updated today

Understanding Smart Access Architecture

Platform Overview

Smart Access is a cloud-native SaaS platform built on enterprise-grade infrastructure:

  • Primary Infrastructure: Google Cloud Platform

  • Global Performance: Cloudflare CDN for optimized content delivery

  • Microservices Architecture: Specialized services for scalability and reliability

  • Enterprise Security: TLS 1.2+ encryption, SOC 2 certified infrastructure

Core Components

Frontend Applications

  • Web Application: Browser-based access for leaders and administrators

  • Mobile Applications: Browser-based and Native iOS and Android apps for frontline associates

  • Progressive Web App (PWA): Optimized experience for mobile browsers

  • RF Device Support: Specialized interface for Zebra and similar warehouse devices

Backend Services

  • Main Application Server: Django/Python REST API backend

  • Portal Services: Node.js/Express applications for role-specific experiences

  • Specialized Microservices:

    • Notification service for real-time alerts

    • Video processing

    • Data warehousing for analytics

    • Proprietary insights engine for analytics


Data Architecture & Security

Data Flow Overview

Smart Access processes data through five secure layers:

  1. Business Layer: User inputs, file uploads, API integrations

  2. Operational Layer: PostgreSQL databases with real-time replication

  3. Data Processing: BigQuery ETL pipelines for analytics

  4. Analytics Layer: Transformed data for reporting and insights

  5. Presentation Layer: Dashboards and in-app visualizations

Data Security Measures

  • Encryption: AES-256 at rest, TLS 1.2+ in transit

  • Access Control: Role-based permissions with audit logging

  • Data Residency: Primary data storage in US regions (configurable for enterprise)

  • Backup Strategy: Daily incremental, weekly full backups with 30-day retention

Data Classification

Smart Access handles the following data types:

  • Employee Data: Names, roles, locations, reporting structure

  • Operational Data: Observations, workflows, compliance records

  • Performance Data: Aggregated metrics, anonymized analytics

  • Operational Artifacts: Videos, documents, assessment results

Note: No personally identifiable information (PII) beyond basic employment data is required.


Security & Compliance Documentation

Accessing the Trust Center

The Smart Access Trust Center provides self-service access to:

  • SOC 2 Type II report and attestation letter

  • Data Processing Agreement (DPA) templates

  • Information Security Program documentation

  • Insurance certificates (Cyber and General Liability)

  • Penetration testing executive summaries

  • Vulnerability management reports

Key Certifications & Compliance

SOC 2 Type II

  • Scope: Security, Availability, and Confidentiality

  • Frequency: Annual audit by independent third party

  • Latest Report: Available in Trust Center

Security Framework Highlights

Our Information Security Program covers 14 control areas:

  1. Access Management

    • Unique user IDs with strong password requirements

    • Multi-factor authentication (MFA) for administrative users

    • Quarterly access reviews

  2. Data Protection

    • Encryption standards (AES-256, TLS 1.2+)

    • Data retention and disposal policies

    • Privacy by design principles

  3. Vendor Management

    • Annual security reviews of sub-processors

    • Contractual security requirements

    • Incident notification protocols

  4. Incident Response

    • 24-hour notification commitment

    • Defined escalation procedures

    • Post-incident review process

Preparing for InfoSec Review

To streamline your security assessment:

  1. Download Core Documents:

    • SOC 2 Type II report

    • Information Security Program PDF

    • Data Processing Agreement

  2. Review Key Controls:

    • Authentication mechanisms (SSO/MFA)

    • Data encryption methods

    • Backup and recovery procedures

    • Incident response protocols

  3. Request Additional Information in the Trust Center:

    • Penetration testing results (if needed)

    • Architecture diagrams (detailed versions)

    • Sub-processor list with locations


Vendor Onboarding Process

Typical Enterprise Timeline

Weeks 1-2: Initial Assessment

  • Security documentation review

  • Architecture evaluation

  • Initial stakeholder meetings

Weeks 2-4: Formal Review

  • InfoSec detailed assessment

  • Legal/procurement negotiations

  • Technical requirements gathering

Weeks 4-6: Technical Planning

  • Integration approach decisions

  • Pilot scope definition

  • User provisioning strategy

Weeks 6-8: Pilot Preparation

  • Environment setup

  • Initial user configuration

  • Pilot kickoff planning

Accelerating Approval

When cross-functional teams are in sync, Smart Access can be deployed in as little as two weeks. To expedite the onboarding process:

  1. Start with the Trust Center: Most security questions are pre-answered

  2. Identify Decision Makers Early: Include all stakeholders from day one

  3. Leverage Pilot Flexibility: Pilots require minimal IT involvement

  4. Use Standard Agreements: Our DPA & MSA aligns with common enterprise requirements

  5. Schedule Regular Check-ins: Weekly status meetings prevent delays


Resources

Did this answer your question?