Webinar Popup Cancel button
Compliance
Published:
September 16, 2020
Updated:
January 22, 2024

Enterprise Security Checklist - Artwork Flow

Arjita

Enterprise Security Checklist - Artwork Flow

Published:
September 16, 2020
Updated:
January 22, 2024
Arjita

Highlights

Database Security

In transit 

Artwork Database secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default. 

At rest 

Database uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.

Backup and Restoration 

The system takes backups at a frequency of every day. Backups are retained for 35 days

Logs 

Every action taken in Artwork Flow Infrastructure is recorded and stored in the form of logs. These logs have information on IP address, who made the request, when was it made and other details.

File storage security

Access and Security

- All the artwork files are stored in a secure S3 bucket on Amazon Web Services (AWS)

- All S3 objects are private by default. In case of Artwork Flow, these objects can be accessed only by the Artwork Flow application layer

  • Artwork Flow uses pre signed URL method which gives you access to the artwork file identified in the URL, provided that the creator of the presigned URL has permissions to access that file. Only the application layer of Artwork Flow has the authority to generate these pre-signed URLs. 
  • Artwork Flow uses its own credentials to generate pre-signed URLs and these are time bound, expiring in 30 mins. 
  • All Artwork Flow files are encrypted using CMK, ensuring that only authorized users can access the files. This way, we manage the segregation of data by entity at the application layer. It's like having a secure vault for your files, and with the help of workflow automation, everything stays organized and accessible for the right people at the right time – making your data management smoother and more reliable.

Monitoring and Logging of Storage Files

  • Server access logs provide detailed records about requests that are made to a bucket. Server access logs are useful for many applications. For example, access log information can be useful in security and access audits

Network Security 

enterprise security checklist
Secured Network at Artwork Flow for your organisation


- All network calls are secured over HTTPS 

- A secured token is used on every API call, this is currently done using JWT

Compliance of best business practices through our service providers 

SOC 2 - Trust

  • Amazon Web Services, Microsoft Azure

ISO 27001 - Information Security Management

  • Microsoft Azure

ISO 27018 - Protection of Personally Identifiable Information

  • Microsoft Azure

PCI DSS - Payment Security

  • Razorpay

ISO 22301 - Business Continuity

  • Amazon Web Services, Microsoft Azure


Download our free Ebook
Thank you!
Form submitted successfully
Oops! Something went wrong while submitting the form.
Download our free Ebook
Thank you!
Form submitted successfully
Oops! Something went wrong while submitting the form.
Manage and scale your creative operations with Artwork Flow.
Try for free