Your Data, Protected
Certivo is built with security at its core. We use industry-leading practices to ensure your sensitive documents and signatures are protected at every step.
Bank-Level Encryption
Your documents and data are encrypted using the same standards trusted by financial institutions and government agencies worldwide.
All stored data is encrypted using AES-256, the gold standard for data protection
All data transmitted between your browser and our servers uses the latest TLS protocol
Documents remain encrypted from upload through signing to final storage
All backup data is encrypted with separate keys stored in secure key management
Encryption Standards
Data at Rest
AES-256256-bit Advanced Encryption Standard
Data in Transit
TLS 1.3Latest Transport Layer Security protocol
Document Hashing
SHA-256Cryptographic hash for integrity verification
Key Management
AWS KMSHardware security modules for key storage
AWS Infrastructure
Multi-Region Deployment
Distributed across multiple AWS availability zones for high availability and disaster recovery.
Auto-Scaling
Infrastructure automatically scales to handle demand while maintaining performance.
DDoS Protection
AWS Shield and CloudFront provide protection against distributed denial-of-service attacks.
AWS Certifications
Built on AWS
Certivo runs on Amazon Web Services, the world's most comprehensive and broadly adopted cloud platform, trusted by millions of customers including the largest enterprises and government agencies.
Comprehensive Access Controls
Control who can access your documents and what they can do with granular permissions and robust authentication options.
Two-Factor Authentication
Require 2FA for all users or specifically for signing actions. Supports authenticator apps and email codes.
Role-Based Access
Define roles with specific permissions. Separate admin, user, and viewer access levels.
Session Management
Automatic session timeouts, single sign-on support, and the ability to revoke sessions remotely.
Password Policies
Enforce strong password requirements including minimum length and complexity, following NIST SP 800-63B guidelines.
Audit Logging
Every access attempt, successful or failed, is logged with timestamp, IP address, and user details.
Email Verification
All user accounts require email verification before accessing sensitive features.
Proactive Security
We don't just build secure systemsβwe continuously test and improve them through rigorous security practices and third-party validation.
Hash Chain Audit Trail
Every action is logged with SHA-256 hash chain verification, making tampering detectable and ensuring complete audit trail integrity.
Signing 2FA
Two-factor authentication is required for document signing, supporting both TOTP authenticator apps and email-based verification codes.
Comprehensive Logging
All user actions, access attempts, and system events are logged with timestamps, IP addresses, and device information.
Encrypted Backups
Automated daily backups with AES-256 encryption, including daily, weekly, and monthly retention policies.
Incident Response
In the unlikely event of a security incident, we have a documented response plan:
Detection & Analysis
Identify and assess the scope of the incident
Containment
Isolate affected systems to prevent spread
Notification
Alert affected customers within 72 hours per GDPR
Recovery & Review
Restore services and conduct post-incident analysis
Security Contact: Report security concerns to security@certivo.io
Your Data is Safe
We implement multiple layers of protection to ensure your data is always available, never lost, and protected against unauthorized access.
Automated Backups
Continuous backups with point-in-time recovery. Your data is replicated across multiple geographic regions.
- β’ Daily full backups
- β’ Continuous transaction logs
- β’ 35-day backup retention
- β’ Cross-region replication
Business Continuity
Designed for 99.9% uptime with automatic failover and disaster recovery capabilities built into our architecture.
- β’ Multi-AZ deployment
- β’ Automatic failover
- β’ RTO: 4 hours
- β’ RPO: 1 hour
Data Deletion
When you delete data or close your account, we ensure complete removal from all systems including backups.
- β’ Immediate soft delete
- β’ 30-day recovery window
- β’ Permanent purge after retention
- β’ Backup purge within 90 days
Data Isolation
Each organization's data is logically isolated. Your data is never accessible to other customers.
- β’ Tenant isolation at database level
- β’ Organization-scoped data access
- β’ Network-level segmentation
- β’ Audit logging per tenant
Compliance & Infrastructure
Certivo is built on AWS infrastructure and designed to meet regulatory requirements for electronic signatures in regulated industries.
AWS Infrastructure
Hosted on SOC 2 Type II certified AWS data centers with enterprise-grade security
GDPR Compliant
Full compliance with EU data protection requirements
FDA 21 CFR Part 11
Designed to meet electronic signature requirements for regulated industries
For detailed compliance documentation, please contact us.
Ready to Get Started?
Join organizations that trust Certivo for secure, compliant electronic signatures.