Workativ Logo

Security

Workativ has implemented robust security processes and controls that are in compliance with industry-leading standards and regulations. Workativ ensures data security, operational security, and physical security on our platform with highly secure and reliable services.

Virtual Private Cloud

Virtual Private Cloud

Workativ is hosted in AWS VPCs in the non-promiscuous mode and further segmented for increased security and manageability.

Access Controls

Access Controls

Workativ implements role-based access through IAM that enforces segregation of duties, two-factor authentication, and end-to-end audit trails, ensuring access is in accordance with security policy.

Encryption

Encryption

AES 256 bit encryption with 1,024-bit key-strength for data at Rest and TLS encryption for data in transit.

Multi-Factor Authentication

Multi-Factor Authentication

AWS console login users have MFA token authentication.

Use SSH Keys Authentication

Use SSH Keys Authentication

Workativ uses PEM key files for server authentication.

SSL Encription

SSL Encription

All external HTTP requests are secured end to end.

Malware & Spam Protection

Malware & Spam Protection

We regularly apply malware and spam protection based on the latest threat signatures and support real-time scanning and security.

Perimeter Security

Perimeter Security

Routing rules are hardened based on pre-established criteria for various permissible transactions across all resources.

Management Plane

Management Plane

Secure administrative tunnel with whitelisted IP addresses for secure connection to the servers for administrative purposes, through a bastion host.

Secure Endpoints

Secure Endpoints

Workativ provides secure transactions with end-to-end encryption and secure server-to-server file transfers.

Maintain Specific Security Groups

Maintain Specific Security Groups

Workativ provides port-based and IP based access to the server for the whitelisted IPs.

Private Network Database

Private Network Database

Our database servers remove connection attempts or access from the Internet.

AWS Cloud Trail

AWS Cloud Trail

We monitor AWS console user log events.

Alerting Systems

Alerting Systems

We monitor Service and Application logs through alerts.

Update and Upgrade Software Regularly

Update and Upgrade Software Regularly

We update server and security patches regularly.