How secure is my data in the Vaultastic cloud?
Vaultastic ensures the highest level of security with a comprehensive security checklist that goes beyond basic cloud security configurations. The solution continuously monitors for potential threats and provides closed-loop feedback to mitigate risks effectively.
Built on the industry-leading AWS cloud infrastructure, Vaultastic builds on the cloud’s shared security model. AWS offers security OF the cloud, while Vaultastic ensures security IN the cloud.
Vaultastic enhances protection at every component level, including network, data, and applications. Key security features include role-based access management (IAM), encryption at rest and in transit, DDOS protection, and multi-factor authentication.
In addition, Vaultastic is designed to meet stringent cybersecurity guidelines from industry regulators such as RBI, SEBI, and IRDAI. The platform undergoes regular vulnerability assessments, penetration testing, and an annual Foundational Technical Review (FTR) by AWS to ensure its security infrastructure remains robust and compliant with industry standards.
What security measures does Vaultastic use to protect my data?
Vaultastic employs a robust, multi-layered security framework based on the cloud’s shared security model to safeguard your data.
It adheres to cybersecurity guidelines from several industry regulatory bodies, ensuring compliance and protection. Vaultastic leverages a public cloud platform that guarantees 11 9’s of data durability, with an in-built disaster recovery (DR) site, alleviating concerns about Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Additionally, strong end-to-end encryption ensures that your data remains visible only to you, further enhancing security and privacy.
Is Vaultastic tested, audited and certified by an independent body?
Yes, Vaultastic is thoroughly tested, audited, and certified by independent bodies. As a cloud-native solution running entirely on the AWS public cloud, Vaultastic leverages AWS’s shared security model.
Mithi’s solutions undergo an annual audit by AWS as part of their Foundational Technical Review (FTR) program, ensuring adherence to strict security, performance and reliability standards.
Additionally, many of Vaultastic’s large, regulated customers conduct independent Vulnerability Assessments and Penetration Testing (VAPT) periodically to verify the security of the platform across all layers. We are proud to note that in over a decade of deploying our solutions across hundreds of servers, no intrusions have been reported.
Does Vaultastic support role-based access?
Yes, Vaultastic supports role-based access as part of its robust security framework. This ensures that only authorized personnel can access specific data or perform certain actions based on their roles.
Besides role-based access, Vaultastic’s security management practices include continuous monitoring, automated threat detection, frequent audits, and ongoing system upgrades. Additionally, regular training on security best practices and continuous improvements help to build strong cyber resilience, safeguarding your data against evolving threats.
How can I ensure that my archived data is only accessible to authorized users?
Vaultastic enforces a zero-trust policy, where all user access is disabled by default. As the administrator, you have full control to define roles and assign role-based access to users according to your organization’s policy.
Through the Vaultastic admin panel and dashboard, you can easily monitor and manage access rights, ensuring that only authorized individuals have access to your archived data, enhancing both security and compliance.
What happens to my data if Vaultastic experiences a security breach?
Vaultastic operates on the AWS cloud, following a shared security model where AWS ensures the security OF the cloud infrastructure, and Vaultastic provides security IN the cloud.
Vaultastic employs multi-layered security measures, including encryption, access control, and auditing, to protect your data. In the unlikely event of a security breach, the robust encryption in place would make it extremely difficult for attackers to access or decipher your data, ensuring a high level of protection even in compromised situations.