Data encryption

Encryption of Data at Rest

Hyper Anna leverages best of breed cloud services with the option to exploit native data encryption services for the protection of client data. By default, all client data ‘at-rest’ (while it is stored on disks) is secured using (AES256) encryption.

Encryption of Data in Motion

Hyper Anna employs industry grade encryption (TLS 1.2 and TLS 1.3) for all web / HTTPS traffic.

Console access to Hyper Anna services is limited to key operational staff and is protected through the use of SSH. SSH sessions are protected via identity key rather than password.

Frequently asked questions

Open encryption methodologies

Q: Do you provide open encryption methodologies (3.4ES, AES, etc.) to tenants in order for them to protect their data if it is required to move through public networks (e.g., the Internet)? 

The data is transmitted under Azure NAT gateway settings from the client platform to the Hyper Anna environment, which allows encryption algorithms such as 3DES and AES.

Secure deletion

Q: Do you support secure deletion (e.g., degaussing/cryptographic wiping) of archived and backed-up data as determined by the tenant? 

Yes, data no longer required may be permanently deleted within Hyper Anna's Azure facility.

Unique encryption keys

Q: Are you able generate unique encryption keys per customer/tenant? 

Yes, different encryption keys can be generated for each client’s Azure Blob Storage, which is administered by Azure Key Vault technology.

Key management procedures

Q: Do you maintain key management procedures, such as by documenting ownership for each stage of the lifecycle of encryption keys? 

Yes.

Encryption at rest

Q: Is tenant data encrypted at rest (on disk/storage) within your environment? 

Yes, data in the Azure storage blob is encrypted.

Platform and data appropriate encryption

Q: Do you have platform and data appropriate encryption that uses open/validated formats and standard algorithms? 

Yes, as provided by Azure storage.

Infrastructure compliance & monitoring

Q: Do you have a capacity to continuously monitor and report the compliance of your infrastructure against your information security baselines? 

Yes.

DDOS protection

Q: Is DDOS protection in place? 

Yes, basic Azure DDOS defence is provided by default and Azure DDOS Protection Standard can be activated if required.

If you have any questions, please contact us at support@hyperanna.com.

Did this answer your question?