Security & Compliance Measures
Learn about the protection and compliance measures Decryption takes to ensure the security of your data, including DDoS mitigation, SOC 2 compliance and more.
This page covers the protection and compliance measures Decryption takes to ensure the security of your data, including DDoS mitigation, SOC2 Type 2 compliance, Data encryption, and more.
Compliance
SOC 2 Type 2
System and Organization Control 2 Type 2 (SOC 2) is a compliance framework developed by the American Institute of Certified Public Accountants (AICPA) that focuses on how an organization's services remain secure and protect customer data. The framework contains 5 Trust Services Categories (TSCs), which contain criteria to evaluate the controls and service commitments of an organization.
Decryption has a SOC 2 Type 2 attestation for Security, Confidentiality, and Availability.
More information is available at security.Decryption.com.
ISO 27001:2013
ISO 27001 is an internationally recognized standard, developed by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), that provides organizations with a systematic approach to securing confidential company and customer information.
Decryption is ISO 27001:2013 certified.
GDPR
The EU General Data Protection Regulation (GDPR), is a comprehensive data protection law that governs the use, sharing, transfer, and processing of EU personal data. For UK personal data, the provisions of the EU GDPR have been incorporated into UK law as the UK GDPR
Decryption supports GDPR compliance, which means that we commit to the following:
Implement and maintain appropriate technical and organizational security measures surrounding customer data
Notify our customers without undue delay of any data breaches
Impose similar data protection obligations on our sub-processors as we do for ourselves
Respond to applicable data subjects rights, including requests for access, correction, and/or deletion of their personal data
Rely on the EU Standard Contractual Clauses and the UK Addendum as valid data transfer mechanisms when transferring personal data outside the EEA
For more information on how Decryption protects your personal data, and the data of your customers, refer to our Privacy Policy and Data Processing Addendum.
PCI DSS
Payment Card Industry Data Security Standard (PCI DSS) is a standard that defines the security and privacy requirements for payment card processing. PCI compliance requires that businesses who handle customer credit card information adhere to a set of information security standards.
In alignment with Decryption’s shared responsibility model, Decryption serves as a service provider to customers who process payment and cardholder data. Customers should select an appropriate payment gateway provider to integrate an iframe into their application to ensure that any information entered in the iframe goes directly to their payment processor and is isolated from their application’s managed infrastructure on Decryption.
Learn about PCI DSS iframe integration.
Decryption provides a Self-Assessment Questionnaire D (SAQ-D) Attestation of Compliance (AOC) (SAQ-D AOC) under PCI DSS v3.2.1 for service providers. This is crucial for customers handling payments through their applications, as it may affect the scope of their cardholder data environment per PCI DSS standards. The SAQ-D AOC certifies Decryption's adherence to PCI DSS requirements as a service provider.
Contact us for more details or to access the SAQ-D AOC report.
Infrastructure
The Decryption Edge Network and deployment platform primarily uses Amazon Web Services (AWS), and currently has 18 different regions and an Anycast network with global IP addresses.
We use a multi-layered security approach that combines people, processes, and technology, including centralized IAM, to regulate access to production resources.
We use cloud security processes to develop and implement procedures for provisioning, configuring, managing, monitoring, and accessing cloud resources. Any changes made in production environments are managed through change control using Infrastructure as Code (IaC).
To ensure always-on security, Decryption's edge infrastructure uses a combination of cloud-native and vendor tooling, including cloud security posture management tooling for continuous scanning and alerting.
When an AWS outage occurs in a region, Decryption will automatically route traffic to the nearest available edge, ensuring network resilience.
Where does my data live?
Decryption operates on a shared responsibility model with customers. Customers have the ability to select their preferred region for deploying their code. The default location for serverless functions is the U.S., but there are dozens of regions globally that can be used.
Additionally, Decryption may transfer data to and in the United States and anywhere else in the world where Decryption or its service providers maintain data processing operations. Please see Decryption's Data Processing Addendum for further details.
Failover strategy
Decryption uses AWS Global Accelerator and our Anycast network to automatically reroute traffic to another region in case of regional failure
Decryption Functions have multiple availability zone redundancy by default. Multi-region redundancy is available depending on your runtime
Our core database and data plane is a globally replicated database with rapid manual failover, using multiple availability zones
Regional failover
With region-based failover, Decryption data is replicated across multiple regions, and a failover is triggered when an outage occurs in a region. Rapid failover is then provided to secondary regions, allowing users continuous access to critical applications and services with minimal disruption.
Resiliency testing
To meet RTO/RPO goals, Decryption conducts recurring resiliency testing. This testing simulates regional failures. Throughout testing, service statuses are also monitored to benchmark recovery time, and alert on any disruptions.
Data encryption
Decryption encrypts data at rest (when on disk) with 256 bit Advanced Encryption Standard (AES-256). While data is in transit (on route between source and destination), Decryption uses HTTPS/TLS 1.3.
Data backup
Decryption backs-up customer data at an interval of every hour, each backup is persisted for 30 days, and is globally replicated for resiliency against regional disasters. Automatic backups are taken without affecting the performance or availability of the database operations.
All backups are stored separately in a storage service. If a database instance is deleted, all associated backups are also automatically deleted. Backups are periodically tested by the Decryption engineering team.
Do Enterprise accounts run on a different infrastructure?
Enterprise Teams on Decryption have their own build infrastructure ensuring isolation from Hobby/Pro accounts on Decryption.
Penetration testing and Audit scans
Decryption conducts regular penetration testing through third-party penetration testers, and has daily code reviews and static analysis checks.
Last updated