Updated: February 2020
Treasured leverages Amazon Web Services (AWS) to deliver a scalable cloud computing platform designed for high availability and dependability.
AWS uses redundant and layered controls, continuous validation and testing, and a substantial amount of automation to ensure that the underlying infrastructure is monitored and protected 24x7.
AWS enables Treasured to ensure secure transactions between separate data and software applications, data replication across multiple physical data center locations, and to obtain and configure capacity with minimal friction.
AWS provides several security capabilities and services to increase privacy and control network access. Treasured uses:
Treasured’s data centers are co-located in some of the most respected data center facility providers in the world. Treasured leverages all of the capabilities of these providers including physical security and environmental controls to secure our infrastructure from physical threat or impact. Each site is staffed 24/7/365 with on-site physical security to protect against unauthorized entry. Security controls provided by our data center facilities includes but is not limited to:
Access to the management network infrastructure is provided through multi-factor authentication points which restrict network-level access to infrastructure based on job function utilizing the principle of least privilege. All access to the ingress points are closely monitored, and are subject to stringent change control mechanisms.
Systems are protected through key-based authentication and access is limited by Role-Based Access Control (RBAC). RBAC ensures that only the users who require access to a system are able to login. We consider any system which houses customer data that we collect, or systems which house the data customers store with us to be of the highest sensitivity. As such, access to these systems is extremely limited and closely monitored.
Additionally, hard drives and infrastructure are securely erased before being decommissioned or reused to ensure that your data remains secure.
Treasured leverages AWS CloudWatch to enable continuous monitoring of our production environments. Our logging includes system actions as well as access and commands issued by our system administrators.
Logs are reviewed to identify potentially malicious activity within our infrastructure. User and system behaviors are monitored for suspicious activity, and investigations are performed following our incident reporting and response procedures.
All database transactions are logged using a user identification number, IP address, timestamp, and information about the action performed.
Treasured leverages AWS IAM access control management when issuing access to all environments. The keys that AWS uses are 2048-bit SSH-2 RSA keys and are regarded as an industry standard. Treasured implements internal processes for issuing and recalling keys from authorized employees.
All data is encrypted in transit with TLS, using a 2048-bit key, signed using the SHA256 RSA industry standard algorithm. Data at rest (residing in our data centers) is encrypted using the industry standard AES-256 algorithm. All data is stored securely on servers located in Canada, and meets Canadian data compliance requirements for certain industries such as the financial and public sectors.
The rules of travel have altered so much in the last few years, with strict regulation regarding air travel, questionable car searches that may vary in regulation from state to state.
Treasured retrieves, encrypts, and stores hourly backups of our production data storage systems. These backups reside within our data centers for security and compliance purposes.
All AWS data centers meet and exceed the strictest of certification and compliance laws. These include:
Treasured employs SDLC practices combined with internal controls to give users peace of mind. Developers run a battery of tests against all change requests spanning multiple environments to ensure consistency and backwards compatibility.
Release management and deployment is driven through an AWS Pipeline architecture, ensuring the ability to back out of changes at any point. Token based authentication provides Treasured administrators total control over access and access expiry.
Treasured has service level agreements in-place with our infrastructure and monitoring vendors. AWS provides a 99.99% uptime guarantee across all services and applications that Treasured leverages.
Treasured uses Stripe as our credit card storage and processing vendor. Stripe has been audited by a PCI-certified auditor and is certified to PCI Service Provider Level 1. This is the most stringent level of certification available in the payments industry.
All card numbers are encrypted on disk with AES-256. Decryption keys are stored on separate machines. None of Stripe’s internal servers and daemons are able to obtain plaintext card numbers; instead, they can just request that cards be sent to a service provider on a static whitelist. Stripe’s infrastructure for storing, decrypting, and transmitting card numbers runs in separate hosting infrastructure, and doesn’t share any credentials with Stripe’s primary services.