We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.
We use Amazon’s Web Services to host our application and store your data. AWS uses a Cloud Architecture, which means underlying computing infrastructure is used only when it is needed (for example to process a user request), to draw the necessary resources on-demand (like compute servers or storage), perform a specific job, and then relinquish the unneeded resources, (often disposing of themselves after the job is done).
Amazon currently has five cloud computing zones: the United States East, the United States West, Europe, Asia Pacific – Singapore and Asia Pacific – Tokyo. We currently use both the United States zones, Europe and Asia Pacific – Singapore.
Amazon has many years of experience in designing, constructing, and operating large scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms, as well as other natural boundary protection.
Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
Amazon provides data center access and information only to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, their access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.
Security within Amazon EC2 is provided at multiple levels: The operating system (OS) of the host system, the virtual instance operating system or guest OS, a stateful firewall and signed API calls.
Each of these items builds on the capabilities of the others. The goal is to ensure that data contained within Amazon EC2 cannot be intercepted by non-authorized systems or users and that Amazon EC2 instances are themselves as secure as possible without sacrificing the flexibility in configuration that customers demand.
Amazon’s EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.95% availability for each Amazon EC2 Region.
For more information visit Amazon Web Services.