padlock

Our Commitment to Privacy and Security

At Planit, your privacy and security are our top priorities. We leverage cutting-edge technologies and adhere to industry best practices to ensure your data is always protected. Here’s how we safeguard your information:

Practices

  • Security Review: Our security experts perform periodic independent security analysis to detect vulnerabilities before they become threats.
  • Penetration Testing: We use the latest techniques bad actors are using in the real world to access private data and take steps to secure your data.
  • Obfuscation: We anonymize the data we receive. For example, organization names are converted to unique IDs making it significantly more difficult to identify raw data as belonging to a particular client.

Secure Cloud Infrastructure

  • AWS: We host our services on Amazon Web Services (AWS), renowned for its robust security and compliance standards. AWS provides advanced threat detection, data encryption, and comprehensive compliance certifications, ensuring your data is stored securely.
  • DynamoDB: Your data is stored securely in the Cloud using Amazon’s DynamoDB scalable, secure solution.
    • Encryption at Rest: Data stored in DynamoDB is encrypted using 256-bit Advanced Encryption Standard (AES-256).
  • CloudFront: Our content delivery network (CDN) is powered by AWS Cloudfront, which includes:
    • Cross-Origin Resource Sharing (CORS): This feature enhances web security by controlling how resources are shared between different domains.
    • Security Headers: We implement strict security headers to protect against a variety of web threats, ensuring safe data transmission and content delivery.
    • WAF: A powerful web application firewall prevents DDOS and other attacks, ensuring you always have access to DoT.
  • CloudFormation: All builds are reproducible via an infrastructure-as-code approach and configuration drift is checked via a daily process to ensure security configurations are consistent and do not change

Development and Code Security

  • GitHub: Our development environment is hosted on GitHub, a trusted platform for secure and collaborative coding. We utilize:
    • Developer Access: All our code repositories are accessible only to authorized personnel using SSO with MFA enabled who can only make changes with signed commits.
    • Github Recommended Security Configurations: We adopt GitHub’s best practices for security, including:
      • Dependabot: Automated dependency updates to ensure vulnerabilities are addressed promptly.
      • Secret Scanning: Continuous scanning for exposed secrets to prevent unauthorized access.
      • Code Scanning: Comprehensive analysis of code to detect and remediate potential security issues.

User Authentication and Access Control

  • Single Sign-On (SSO): We implement Single Sign-On (SSO) to streamline and secure user authentication, ensuring that only authorized users can access our systems and services.
  • Access Tokens: Uploading data through our API can only be done with secure authentication tokens with scoped permissions that you control.
  • Separation of Accounts:
    • AWS: Our Production and Development resources are in separate, isolated AWS accounts. Developers cannot access production data without proper authorization.
    • Developer: Development data is stored separately from other Planit information servers. Non-developers cannot access data related to DoT.

Your trust is paramount to us, and we are committed to maintaining the highest standards of privacy and security. With these technologies and practices in place, you can be confident your data is always in safe hands. Thank you for choosing Planit.

Find more details in our FAQ.


Table of contents


© 2024 Planit Testing - ✉ infoau@planit.com