- Cloud Infrastructure Security
All of our services are hosted with Amazon Web Services (AWS). They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visitAWS Security.
- Data Hosting Security
All of our data is hosted on Amazon Web Services (AWS) database. Please reference the above vendor specific documentation linked above for more information.
- Encryption at Rest
All databases are encrypted at rest.
- Encryption in Transit
Our applications encrypt in transit with TLS protocol & AES 256 key encryption
- Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
- Logging and Monitoring
We actively monitor and log various cloud services.
- Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
- Incident Response
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.