Data Security
Safety & Security Protocols
The bucket.io Security Framework consists of standards and practices that form a multi-tiered approach to safeguarding data integrity and confidentiality, as well as infrastructure and network stability. That means we embed best practices for industry compliance through internal processes along with regular review and audits to maintain the most up-to-date security practices and protocols. The bucket.io (BKT) Security Framework includes:
- Application Security
- Network & Infrastructure Security
- Data Security
- Organizational Security
- Cloud Security
- Industry Compliance
The bucket.io security processes support full redundancy, vulnerability management and business continuity plans.
Data Encryption
Your Data is securely encrypted. bucket.io uses 256bit SSL encryption to safeguard customer data. All data between the user browser and the bucket.io cloud is established through an HTTPS connection which encrypts the communication and secures the web server identity.
Network Security
We’ve partnered with Amazon Web Services (AWS), one of the world’s most secure and reliable hosting platforms. At their state-of-the-art facilities, the bucket.io dedicated and cloud servers have a global uptime average of >99.999% with Tier 1 Premium Bandwidth. The bucket.io servers are located at AWS US Data Centers, with the extremely rigorous security parameters, of which you can learn more here.
Additionally, the bucket.io team has implemented and regularly manages a firewall process to ensure operability with the latest threats to cyber security.
Disaster Recovery & Continuity
The bucket.io dedicated servers at AWS offer continuous backup and business continuity. In addition to 24/7/365 onsite security, the servers are monitored around-the-clock to assess system health, optimal performance and early detection of problems. We also have a dedicated immediate response team.
Our Security Framework protocols require full redundancy with our network infrastructure; the support all of those redundancy requirements, feature several zones for added redundancy within the region, and also offers geographic redundancy for disaster recovery.