HowToo’s applications and your data is securely stored on locally-based servers provided by Amazon Web Services (AWS). AWS is the industry leader for providing secure, cloud-based computing.
With more security standards and compliance certifications than any other offering, AWS maintains the highest quality of physical, environmental, access and business continuity controls.
We employ AWS’s Australian data centers in the Sydney region so that your organization can easily satisfy internal requirements.
Customer data is stored and processed on segregated databases with individual authentication.
Data handled by HowToo is encrypted in transit and at rest via the AWS Key Management Service (KMS). HowToo employs SHA-256 encryption and authentication protocols, with keys rotated regularly and private keys kept in an encrypted drive. All encryption keys are created, revoked and destroyed according to our documented key management process.
HowToo’s comprehensive, ISO 27001:2022 accredited access control policy ensures that your data is rarely accessed. Strict, role-based user access is employed and managed via the AWS IAM Manager .
Access logs are retained for 12 months and regularly audited. Access is conducted directly via trusted IPs.
HowToo is dedicated to the privacy of our customer’s data, and all business is conducted with adherence to the Australian Privacy Act (1988) and privacy principles.
The HowToo team follows strict on-site security measures to protect our office-based assets, including key card access, locks, visitor authorisation, security feeds and best-practice processes.
Comments
0 comments
Please sign in to leave a comment.