Hi! We noticed that your browser has extensions installed that may cause our website to not display or function properly for you.
For best user experience, we highly suggest to turn off ad blockers or privacy trackers (such as Privacy Badger or Firefox Enhanced Tracking).
Thank you.
From offline documents to actionable data: Anduin's Data Extraction Service is here! Learn More →
Security is our top priority
We understand the importance of protecting your data and are committed to ensuring confidentiality and privacy.
Data is encrypted, storage is secure, and access is strictly controlled.
The following guide highlights Anduin’s industry-standard security features.
Reliability
Anduin’s infrastructure and applications are architected to achieve a high level of business continuity, which includes disaster recovery (DR) and high availability (HA).
Our DR solutions provide fully automated failover to a backup system so that our services can continue to operate without disruption. Customers’ data are continuously replicated across different availability zones on Amazon AWS cloud. In addition, all databases and document storage systems are backed up throughout the day.
Our HA solutions aim at offering 99.9% uptime. We employ a multi-layered approach application resilience to user errors and infrastructure failures, data resilience to corruption, and infrastructure resilience to environmental failures (e.g. machine down, network disconnection, etc.).
Authentication
Anduin enforces a strong authentication flow from user logins to every single API request: our servers verify if users are who they claim to be.
We offer industry standards to achieve this goal:
Authorization
As a multi-tenant platform, our system enforces a strict authorization flow to all data access points: users are restricted from accessing data when they don’t have the rights to do so.
Encryption
All data transmitted to the Anduin system from clients is encrypted using HTTPS and TLS version 1.2 and above. Our user data and critical infrastructure configurations are encrypted using AES-256, block-level storage encryption. All encryption keys are protected by an industry-grade secret vault. The vault is protected by a two-man integrity policy.
Protection of Customer Data
Anduin’s privacy policy can be found here. At Anduin, our customer's privacy is our first concern. We strive to use information to provide the best possible service while respecting the confidentiality of the information we are entrusted with. Currently, we are compliant with the U.S. ESIGN Act of 2000 in terms of processing customers’ e-signature, and with the EU General Data Protection Regulation (GDPR).
Enterprise network security
Anduin servers are protected behind firewalls to control both internal and external traffic. Our systems use multiple virtual networks for isolation and protection between different modules. We conduct regular network penetration testing to proactively detect potential threats.
Internal data access
Anduin may access customer data only for the purpose of providing a service, preventing or addressing technical problems, at a customer’s request in connection with customer support matters, or as may be required by law.
At Anduin we maintain the principle of least privilege for all customer data. Employees are given access only to data that is a minimum requirement to perform those operations. Where necessary, personal data are pseudonymized to protect data confidentiality.
Data access controls (such as separation of duties) are designed to prevent personnel from mishandling data.
These access controls are continually reviewed and updated, as necessary.
Monitoring, alert, and response
At Anduin, we maintain up-to-date operating systems across our network. Verified security patches are deployed as they’re released. We continuously monitor for both malicious and accidental incidents.
Email security
Anduin uses industry-standard encryption for SMTP communication channels through TLS. We enforce the legitimacy of the TLS certificates for email exchange.
Audit logs
All actions in the system are logged in an immutable audit trail accessible to system administrators. Anduin provides a suite of tools to search, filter, and report on these actions.
Secure Code Practice
Anduin develops its product with a continuous application deployment model. In this model, all code must be reviewed by qualified Anduin engineers before it is merged into the main-line branch and deployed to production. Additionally, automated tools are used to continuously analyze the code-base for vulnerable dependencies, unsafe coding practices, and inadvertent inclusions of sensitive data before being deployed to production.
Compliance
For more information, email: support@anduintransact.com
Anduin would like to extend special thanks to all personnel that have contributed to the security of our platform. See our Hall of Fame
The Uniform Electronic Transactions Act, The U.S. ESIGN act of 2000, eIDAS No 910/2014 from the European Union (Basic and Advanced), Write Once Read Many Archiving (WORM), EU General Data Protection Regulation (GDPR), SOC2 Security, Availability & Confidentiality Type 1.
© 2024 Anduin Transactions. All Rights Reserved.