Security Protocols and Safeguards

Security Safeguards and Protocols

At ChargeKeep, our customers place their trust in us to oversee their business data and vital online operations. We understand that our customers prioritize security, reliability, and compliance above all else. Consequently, we consider the security of our customers’ data and the integrity of our network security as our highest priority. To that end, we have implemented a comprehensive array of protocols, processes, guidelines, and safeguards to ensure the security and integrity of our clients’ data, both within our infrastructure and during its journey across network connections. We leave no stone unturned in our efforts to mitigate security risks across our infrastructure.

NETWORK SECURITY PROTOCOLS AND STRONG ENCRYPTION:

Our network security protocols are meticulously designed to protect network data from any unauthorized attempts to access or extract its contents, while also preventing any unauthorized users, applications, services, or devices from gaining access to network data. Our security arsenal includes the following protocols:

  1. ChargeKeep Secure Socket Layer (SSL)
  2. ChargeKeep Secure File Transfer Protocol (SFTP)
  3. ChargeKeep Secure Hypertext Transfer Protocol (HTTPS)

 

This first layer of security ensures that all data in transit between your browser and ChargeKeep remains safeguarded through 256-bit SSL encryption. Industry-standard encryption protocols are used to guarantee the security of your sensitive information during transmission, as indicated by the lock icon in your browser.

NETWORK INFRASTRUCTURE & FIREWALLS:

  • Firewalls: The ChargeKeep software platform and all associated data are securely housed behind firewalls, providing comprehensive system-level protection. Additionally, where applicable, we employ Cloudflare Firewall and DDOS protection services at the domain level.

  • Cloud Infrastructure: Our application infrastructure operates on the state-of-the-art Heroku, Microsoft Azure and Amazon Web Services (AWS) cloud platforms, incorporating physical security measures such as surveillance, access control, and power generators. 

  • Our servers undergo regular vulnerability scans conducted by third-party providers to swiftly identify and address potential risks.

DATA ACCESS SECURITY AND ROUTINE MONITORING

ChargeKeep employs a multi-faceted approach to safeguard client data from unauthorized access:

  • User Permissions Management: We have developed an intricate hierarchical User and Roles Management system that enables us to meticulously configure permissions for each user or group.

  • Multi-factor Authentication and Identification: Users on the ChargeKeep platform can enhance their data security by activating our MFA functionality.

  • OAuth Authentication: Sensitive information, such as credentials for third-party financial institutions, is not captured or stored on our network. This information is directly transmitted from the user’s browser to the financial institution, providing us with limited read-only access necessary for reporting purposes.

  • Data Encryption: Confidential credentials and other sensitive data stored on our network benefit from encryption security, adding an additional layer of defense for client data.

ROUTINE SECURITY AUDITS, CONTROLS, AND BACKUPS

  • Development Process and Team Training: Security is woven into the fabric of all our development efforts. Our software engineering team adheres to the secure development practices outlined by OWASP and diligently follows the principle of least access.

  • Access Monitoring: We have implemented internal systems for monitoring user activity and employ a velocity alerting system to swiftly notify us of any system-level anomalies, with automatic user suspension in the event of a detected brute force attack.

  • Backups: Regular data backups are conducted using the Azure cloud infrastructure, ensuring the replication and storage of databases in multiple geographic locations.

CONTACT US

Should you have any inquiries regarding our Security Protocols or practices, please feel free to reach out to us.

 

Last Updated: Oct 17, 2023.