Skip to main content
Feedback

Data encryption

Internal communication within Data Integration uses SSL to ensure secure communication. Credentials used to access other systems (such as your database or an integration) are encrypted at runtime before stored by Data Integration.

Data is encrypted both in transit and at rest within the platform. At rest, data is protected using industry-standard AES-256 encryption.

Data Integration provides multiple methods to connect to integrations and destinations. These include all plans with SSL/TLS, SSH tunnels, and IP whitelisting.

Data at rest encryption

Data Integration deploys industry-leading encryption algorithms to secure customer data and files in Data Integration storage systems based on AWS configuration. Customers data at rest is encrypted and hosted on dedicated storage services provided by AWS. These are secured via durable encryption, using advanced encryption standards (AES256).

This encryption meets the data security standards required by the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, and the Health Insurance Portability and Accountability Act (HIPAA).

Data in transit encryption

All traffic between the Data Integration's customers and the application is secured through a TLS connection, which encrypts all communication between the web server and client browser. The application security protocols are periodically updated to accept only recent versions (currently ver. 1.2 and above), discontinuing support for older TLS 1.0 and 1.1 versions, which were deprecated by the Internet Engineering Task Force (IETF) in June 2020 (RFC 8996).

Database encryption

AWS KMS (Amazon Key Management Service) and its encryption standards protect all passwords and credentials on internal databases. To learn more, refer to the Amazon's encryption standards.

Backups

All network backups are encrypted with Advanced Encryption Standard AES256.

Endpoint encryption

Full Disk Encryption (FDE) is enforced on all Data Integration endpoints and is enforced across all operating systems, based on the company’s Information Security Policy.

On this Page