Security
Data Storing
At Cloud4.ai, we prioritize the security and confidentiality of your data. We employ stringent measures to ensure that sensitive information remains protected at all times. C4AI does not store any credentials or data in an unencrypted format.
🔐 Note: All credentials are decrypted only during execution, minimizing the risk of unauthorized access.
Network Security
Cloud4.ai adheres to industry-leading security practices, leveraging the robust infrastructure of AWS (Amazon Web Services). We implement AWS security best practices to safeguard your data throughout its lifecycle. This includes limiting access to ports, encrypting data during transfer, and implementing comprehensive network security protocols.
Logging Policies
Protecting your privacy and confidentiality is paramount to us. C4AI does not log any credentials provided or stored within our system. This ensures that sensitive information remains inaccessible to unauthorized parties and minimizes the risk of data exposure.
Encryption Keys
We prioritize data encryption as a fundamental aspect of our security framework. Each organization within Cloud4.ai is allocated unique encryption keys, ensuring the isolation and protection of data.
🔐 Note: Additionally, unique encryption keys are assigned to each record, further enhancing data security and confidentiality.
Security Practices
Cloud4.ai adheres to the highest security standards and best practices to ensure the integrity of your data. We utilize Advanced Encryption Standard (AES) with a 256-bit key length, enhancing encryption strength and resilience. In some cases, we employ 512-bit key length encryption for even greater security measures.
🔐 Note: Users are provided with the flexibility to choose their preferred method of credentials passing, ensuring compatibility with diverse security requirements. Read More: CSS Best Practices
Data Removal
We understand the importance of data privacy and compliance. Cloud4.ai provides mechanisms for data removal upon request, enabling users to maintain control over their data and ensuring compliance with relevant regulations and policies.
Last updated