Security and Privacy
Security of your data is at the heart of Cubyts’s design. We have best-in-class security, periodic audits, and continuous monitoring to ensure that your dat...
Thu, 23 Mar, 2023 at 9:30 AM
The pillars of our security practices are Encryption of data in transit, Encryption of data at rest, Infrastructure security, Application security, Vulnerab...
Thu, 23 Mar, 2023 at 9:31 AM
The Data transmitted when there is communication between you and our servers is encrypted with 128-bit SSL/TLS encryption; we use industry-standard encrypti...
Thu, 23 Mar, 2023 at 9:31 AM
Cubyts’s computing infrastructure is provided by AWS, a secure cloud services platform. AWS’s physical infrastructure has been accredited under SOC2, ISO 27...
Thu, 23 Mar, 2023 at 9:31 AM
We periodically check and apply patches for third party software/services. As and when vulnerabilities are discovered, we apply the fixes within the predefi...
Thu, 23 Mar, 2023 at 9:31 AM
All data access to Cubyts is protected by a role based access-control (RBAC) system, which only lets users view data for which they have permission. Cubyts ...
Thu, 23 Mar, 2023 at 9:31 AM
We conduct periodic penetration tests to uncover potential vulnerabilities, using the services of an independent, qualified third party VAPT service.
Thu, 23 Mar, 2023 at 9:31 AM
All Cubyts personnel are required to undergo a security training, specifically designed for a cloud-hosted set-up. It covers industry best practices involvi...
Thu, 23 Mar, 2023 at 9:32 AM
All-access to our production infrastructure requires multi-factor authentication and is restricted to authorized personnel only. We limit access to customer...
Thu, 23 Mar, 2023 at 9:32 AM