Remote has an Encryption & key management policy in place. We make use of encryption at-rest and in-transit and run our systems in private segregated networks with firewalls in between each of them. We enforce the usage of recent versions of the TLS protocol (>1.2); we store user data in a database encrypted at rest using the AES-256 encryption algorithm. Remote rotates all its AWS KMS Encryption Keys on an annual basis.
What is Remote’s process for Data encryption ?
Was this article helpful?1 out of 1 found this helpful
Have more questions? Submit a request
Article is closed for comments.