Operational Framework
Security
Data Security Attributes
9min
what is data security? the security of data refers to the process of preventing unauthorized access to it and ensuring its integrity throughout its life cycle encryption, hashing, tokenization, and key management techniques secure data across applications and platforms for example, using encryption to prevent hackers from using your data if it is breached what data encryption do we employ? authorisation token based security signzy uses the loop back frameworkβs inbuilt access token generators for authentication methodology end to end encryption signzy uses ssl for encrypting the entire channel transport layer security (tls) signzy has implemented tls versions 1 2 and 1 3 encryption on the media storage container signzy uses the container to back up our media data as encrypted where all the uploaded data is encrypted, and the long chain of unguessable endpoints is generated what data purging policies do we have? we have below data purging methods api based data purging a delete api can be called to purge the data in place ttl based data purging we can implement a configurable ttl feature to purge data over time, as we can define ttl in 15 minutes and longer safety precautions to protect our administration panel signzy uses multi factor authentication (mfa) and intranet (vpn) to protect our administration board which enhances an additional level of security to the platform protection to attenuate the dos/rate limit attacks signzy uses server & application level protection to protect the types of rate limit attacks we can configure certain security features which provide additional security, such as automatic password expiration functionality connection failure limit which blocks the user account after some erroneous attempts two factor authentication functionality as there is ip table dos protection on the server level, all login endpoints are safe from rate limit attacks for reference https //gist github com/mattia beta/bd5b1c68e3d51db933181d8a3dc0ba64 security headers & application level security at the api and application level, signzy has numerous safety metrics some of them are detailed below header level protection x xss protection cross origin resource sharing (cors) content security policy application level protection most http requests are encrypted within the application, so manipulation of requests cannot be possible this makes the application safer and more reliable additionally, concurrent sessions are not permitted, which makes the product more sustainable security testing from cert in empanelled vendor annually signzy ensures the third party application penetration testing & source code testing of video kyc products at least annually from cert in empanelled vendors to ensure the supreme security of our product platform additionally, the signzy information security team performs monthly penetration testing as per the owasp top 10 standards along with automated vulnerability assessment with licensed nessus professionals & source code reviews at every major release to ensure information security technology used for encryption of data at rest and data in motion signzy ensures data security during transit and at rest for the data at rest, we support disk level encryption (sse with pmk) with aes256 algorithm, and for data in transit all communications client device to server, server to server, or signzy server to any requisite external service happen only over strong cipher tls 1 2+ channel encryption with a minimum of 2048 bit rsa key over sha 256 hash algorithm pkcs #1 sha 256 with rsa encryption algorithm used as certificate signature algorithm getting help please feel free to contact us if you have any questions, require clarification, or have ideas for how to make the documents or any of our services better you can reach out to us at help\@signzy com