We use AWS to host our cloud infrastructure and services. AWS is a best-in-class SOC 2 Type 2 certified cloud vendor. We leverage AWS services and follow both their best practices and the most strict industry security standards to achieve the most secure cloud infrastructure. A sampling of the cloud security practices we follow are as follows:
- Segmented virtual private clouds (VPCs) for different environments to ensure data is isolated at the network level
- Network segmentation and private subnets to ensure that no data is accessible directly from the public internet
- Data encryption both in transit and at rest to ensure that sensitive information is never exposed whether it's in storage or while it's being transferred
- Up-to-the minute data backups to ensure that data is never lost and can always be restored in the event of a disaster
- Publicly facing applications and endpoints only expose the necessary ports for client access, and all communications occur over TLS 1.2 or above
- Applications are configured to be highly available, redundant, scalable, and fault tolerant to ensure the highest possible system uptime