With attention focused on the compliance regulations and following industry best practices, insisive cloud incorporates multiple security strategies to prevent unauthorized use of resources.

Data Encryption

Sensitive data is encrypted at every step:
insisive cloud does not store any AWS keys, user passwords in plain text.

Temporary Restrictive Access to the AWS account.

The authentication is being made based on the IAM Cross Account Role & custom External ID only. All calls within the customer's account are secured via IAM Cross Account Role & UUID External IDs. Meaning, only AWS account IDs that grant specific access can be accessed until the permission is granted. AWS IAM Cross account role can be revoked at any point in time to prevent further use of the account.

Strict Security and Key Management Procedures

Sensitive account data is stored with 256 bit encryption and Staff members do not have the ability to decrypt the data.

insisive cloud data is stored on Amazon Web Services data centers that have achieved ISO 27001 certification, PCI DSS Level 1 compliance, and SAS70 Type II. Learn more about Amazon Web Services security. insisive cloud complies with the CIS and OWASP prescriptive guidance for web based application security.