What is Remote’s process for Data encryption ?

Article author
Nneka
  • Updated

Remote has an Encryption & key management policy in place. We make use of encryption at-rest and in-transit and run our systems in private segregated networks with firewalls in between each of them. We enforce the usage of recent versions of the TLS protocol (>1.2); we store user data in a database encrypted at rest using the AES-256 encryption algorithm. Remote rotates all its AWS KMS Encryption Keys on an annual basis.

Was this article helpful?

1 out of 1 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.