HECTOR, hosted securely on the AWS cloud platform, safeguards data by utilizing encryption during transmission and storage. It accommodates widely adopted authentication methods, such as Single Sign-On (SSO) and two-factor authentication (2FA). To ensure tenant isolation, HECTOR offers dedicated infrastructure within a high availability cloud environment for each tenant. Its versatile role-based access control (RBAC) mechanism allows for granular management of user permissions, streamlining access management and mitigating potential errors. The HECTOR Activity Log serves as an audit trail, meticulously documenting user actions. To enhance transparency and accountability, customizable alerts are sent to responsible individuals whenever changes or activities impact risks.