Security

Encryption at Rest

Our databases are encrypted at rest using AES-256 data encryption, ensuring the highest standard of security for your data. This robust encryption applies not only to our primary and replica database instances but also extends to all automated backups. In addition, we enforce strict controls to limit access to these data stores.

Encryption in Transit

All data exchanged with our application is secured using industry-standard TLS (Transport Layer Security). Our application maintains an active TLS certificate that undergoes automatic renewal. We ensure that all HTTP requests to our servers are seamlessly redirected to HTTPS, guaranteeing that your interactions with our platform are secure and private.

Backups

Consistent with best practices, our database is automatically backed up every day. These backups are securely stored and can be used to quickly restore the system to a previous state in case of an emergency. This strategy ensures data integrity and availability, even in unforeseen circumstances.

DDoS Protection

To safeguard against Distributed Denial of Service (DDoS) attacks, our hosting provider integrates Cloudflare’s industry-leading DDoS protection infrastructure. This advanced system actively monitors and mitigates any incoming threats, ensuring uninterrupted service and robust defense against a wide range of DDoS attack vectors.

Continuous Monitoring and Updates

We employ continuous monitoring of our systems to identify and address potential security threats. Our infrastructure, powered by Render, ensures regular updates and patches to all components, keeping our platform secure against known vulnerabilities.

Compliance and Standards

Our security measures align with industry compliance standards and best practices. We conduct regular security audits and assessments to ensure our systems adhere to these standards, offering you a reliable and trustworthy service.

Access Control and Authentication

Stringent access controls are in place to ensure that only authorized personnel have access to sensitive data and systems. We employ multi-factor authentication and robust identity verification processes to maintain the integrity of our access protocols.

At Pivotal Incident Manager, we prioritize the security of our platform and the protection of your data. For more details on our security policies or if you have any concerns, please contact us.