{"id":938,"date":"2020-09-02T17:59:41","date_gmt":"2020-09-02T17:59:41","guid":{"rendered":"https:\/\/senitron.net\/developers\/?page_id=938"},"modified":"2020-09-02T20:59:07","modified_gmt":"2020-09-02T20:59:07","slug":"documentation-security-practices","status":"publish","type":"page","link":"https:\/\/senitron.net\/developers\/documentation-security-practices\/","title":{"rendered":"Documentation-Security Practices"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:0px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e2e2e2;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\"><h3><strong>Security Practices<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Our goal is to unleash the potential of RFID for every project for clients of any size and industry, and in turn, help advance humanity through the power of RFID technology and software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We know that your information is the heart of your business and life, thus the reason why security is one of our top priorities. We're transparent with our security practices so you can feel informed and safe using our products and services.<\/span><\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:50px;margin-bottom:50px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e2e2e2;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p><b>Encryption and Key Management<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b>Encryption in transit<\/b><\/p>\n<p><span style=\"font-weight: 400;\">All customer data stored within Senitron cloud products and services is encrypted in transit over public networks using Transport Layer Security (TLS) 1.2+ with Perfect Forward Secrecy (PFS) to protect it from unauthorized disclosure or modification. Our implementation of TLS enforces the use of strong ciphers and key-lengths where supported by the browser.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Encryption at rest<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Typically Senitron cloud is not required to maintain financial or sensitive data, thus full DB encryption or Drive encryption is generally not practiced, instead only specific fields such as user names, emails, and passwords are encrypted, as well as uploaded user files (such as handheld RFID read files, which do not contain sensitive data). Concurrently, for government projects, and or other sensitive projects these features are offered on demand for additional fees. \u00a0 <\/span><\/p>\n<p><b><br \/>\n<\/b><b>Government &amp; Sensitive Project\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For sensitive projects we typically accommodate full disk, industry-standard AES-256 encryption at rest, as well full DB encryption. Data encryption at rest helps guard against unauthorized access and ensures that data can only be accessed by authorized roles and services with audited access to the encryption keys.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Database Encryption <\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Specific database fields and tables which may contain sensitive information, such as user names, emails, and or financial data are encrypted for extra protection.<\/span><\/p>\n<p><b><br \/>\nEncryption key management<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Senitron uses the <\/span><a href=\"https:\/\/aws.amazon.com\/kms\/\"><span style=\"font-weight: 400;\">AWS Key Management Service (KMS)<\/span><\/a><span style=\"font-weight: 400;\"> for key management. The encryption, decryption, and key management process is inspected and verified internally by AWS on a regular basis as part of their existing internal validation processes. An owner is assigned for each key and is responsible for ensuring the appropriate level of security controls is enforced on keys.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"side-navigation.php","meta":{"footnotes":""},"class_list":["post-938","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/pages\/938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/comments?post=938"}],"version-history":[{"count":0,"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/pages\/938\/revisions"}],"wp:attachment":[{"href":"https:\/\/senitron.net\/developers\/wp-json\/wp\/v2\/media?parent=938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}