Encharge LTD Security

Protecting and securing data at Encharge LTD is our top priority.

Infrastructure

System architecture

Encharge LTD’s architecture is designed to be secure and reliable. We use an n-tier architecture with firewalls between each tier and additionally within certain tiers between services. Services are accessible only by other services that require access. Access keys are rotated regularly and stored separately from our code and data.

Failout and disaster recovery

Encharge LTD is built with fault tolerance capability.

Data centers

Our application is hosted and managed within Amazon Web Services (AWS) secure data centers. These data centers have been accredited under:

  • ISO 27001
  • SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 - Type II)
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)

We make extensive use of the capabilities and services provided by AWS to increase privacy and control network access throughout our system. Documents that provide more details about AWS security are available at AWS Whitepapers.

Vulnerability scans & pentesting

Encharge LTD uses security tools to continuously scan for vulnerabilities. Additionally, vulnerabilities in third-party libraries and tools are monitored.

The system regularly undergoes third-party security reviews and penetration testing to identify potential vulnerabilities and ensure that they are addressed.

Firewall

Our servers are protected by firewalls and not directly exposed to the Internet.

Data

Data storage

Encharge LTD data stores are accessible only by servers that require access. Access keys are stored separately from our source code repository and only available to the systems that require them. Additionally, production environments are sandboxed from testing environments.

Backups

We maintain secure encrypted backups of important data for a minimum of 30 days. We do not retroactively remove deleted data from backups as we may need to restore it, if removed accidentally. Backup data is fully expunged after 90 days.

Logs

We aggregate logs to secure encrypted storage. All sensitive information (including passwords, API keys, and security questions) is filtered from our server logs. Log data is fully expunged after 90 days.

Authentication

Passwords

We never store passwords in a form that can be retrieved. Instead, we store an irreversible cryptographic hash using a function specifically designed for this purpose. Сessions automatically expire after a period of inactivity.

User roles

We provide multiple user roles with different permissions levels within the product. Roles vary from account owners, to admins, users, and roles that limit visibility of Personally Identifiable Information (PII).

Encryption

HTTPS

All Encharge LTD web traffic is served over HTTPS. We force HTTPS for all web resources, including our REST API, web app and public website. We also use HSTS to ensure that browsers communicate with our services using HTTPS exclusively. Additionally, we use only strong cipher suites.

Policies

Policies

Encharge LTD has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with employees.

Incident response

Encharge LTD has a defined protocol for responding to security events.

Security training

All employees complete security training when they join and are continually refreshed.

Employee vetting

Encharge LTD performs background checks on all new employees in accordance with local laws.

PCI compliance

All credit card payments paid to Encharge LTD go through our payment processing partner, Stripe. Details about their security posture and PCI compliance can be found at Stripe’s Security page.

Disclosure

If you have any concerns or discover a security issue, please contact us directly. Our Security team will then take appropriate action for resolution. We request that you do not publicly disclose any issue you discovered until after we have addressed it.

GDPR compliance powered by ComplyDog