All data is encrypted in transit between client application (whether it be an app or desktop / web) and our server infrastructure (hosted on Amazon AWS). We encrypt via TLS, a widely used protocol for ensuring the security of communications while in transit.
Our database instances leverage “encryption at rest” which essentially means the data are encrypted at the server level and if the server were to be compromised for any reason the intruder would need a “key” to decrypt the contents. We use the industry standard AES-256 encryption algorithm to encrypt your data. Once your data are stored with Standard Data, authentication and decryption of your data transparently with a minimal impact on performance.
We keep a detailed log of access, updates, or deletes of data. We capture the user performing the action, the IP address, and the date / time of the action. All of this data is available within your account.
We carefully control who has access to all aspects of our system ranging from the physical servers (accessed via SSH) to our database (no direct access allowed) to our software (which has multiple layers of security).
All data collected at the enterprise and project level are owned by the client and will not be reused, sold, or presented without the express written permission of the client. Additionally, we offer a number of ways that countries can maintain ownership of their data while still using the Standard Data platform. Read more here.
Our DevOps team has a series of low and high level monitors in place that keep us aware of system stability at all times. We have a monthly plan to review our servers to determine whether they need to be patched or not.
Our system has automatic backups that are retained for 7 days.
We have a detailed incident response plan that involves several core areas: