Skip to main content
Enterprise Security

Your Data, Protected

Certivo is built with security at its core. We use industry-leading practices to ensure your sensitive documents and signatures are protected at every step.

πŸ”AES-256 Encryption
πŸ›‘οΈTLS 1.3 In Transit
☁️AWS Infrastructure
πŸ”’SHA-256 Hashing
πŸ”‘2FA Authentication
πŸ” Encryption

Bank-Level Encryption

Your documents and data are encrypted using the same standards trusted by financial institutions and government agencies worldwide.

AES-256 at Rest

All stored data is encrypted using AES-256, the gold standard for data protection

TLS 1.3 in Transit

All data transmitted between your browser and our servers uses the latest TLS protocol

End-to-End Protection

Documents remain encrypted from upload through signing to final storage

Encrypted Backups

All backup data is encrypted with separate keys stored in secure key management

Encryption Standards

Data at Rest

AES-256

256-bit Advanced Encryption Standard

Data in Transit

TLS 1.3

Latest Transport Layer Security protocol

Document Hashing

SHA-256

Cryptographic hash for integrity verification

Key Management

AWS KMS

Hardware security modules for key storage

AWS Infrastructure

Multi-Region Deployment

Distributed across multiple AWS availability zones for high availability and disaster recovery.

Auto-Scaling

Infrastructure automatically scales to handle demand while maintaining performance.

DDoS Protection

AWS Shield and CloudFront provide protection against distributed denial-of-service attacks.

AWS Certifications

SOC 1/2/3ISO 27001ISO 27017ISO 27018PCI DSSHIPAA
☁️ Cloud Infrastructure

Built on AWS

Certivo runs on Amazon Web Services, the world's most comprehensive and broadly adopted cloud platform, trusted by millions of customers including the largest enterprises and government agencies.

SOC 2 Type II certified data centers
Physical security with 24/7 monitoring
Redundant power and cooling systems
Automated backup and disaster recovery
πŸ‘€ Access Control

Comprehensive Access Controls

Control who can access your documents and what they can do with granular permissions and robust authentication options.

Two-Factor Authentication

Require 2FA for all users or specifically for signing actions. Supports authenticator apps and email codes.

Role-Based Access

Define roles with specific permissions. Separate admin, user, and viewer access levels.

Session Management

Automatic session timeouts, single sign-on support, and the ability to revoke sessions remotely.

Password Policies

Enforce strong password requirements including minimum length and complexity, following NIST SP 800-63B guidelines.

Audit Logging

Every access attempt, successful or failed, is logged with timestamp, IP address, and user details.

Email Verification

All user accounts require email verification before accessing sensitive features.

πŸ” Security Practices

Proactive Security

We don't just build secure systemsβ€”we continuously test and improve them through rigorous security practices and third-party validation.

πŸ”—

Hash Chain Audit Trail

Every action is logged with SHA-256 hash chain verification, making tampering detectable and ensuring complete audit trail integrity.

πŸ”

Signing 2FA

Two-factor authentication is required for document signing, supporting both TOTP authenticator apps and email-based verification codes.

πŸ“‹

Comprehensive Logging

All user actions, access attempts, and system events are logged with timestamps, IP addresses, and device information.

πŸ’Ύ

Encrypted Backups

Automated daily backups with AES-256 encryption, including daily, weekly, and monthly retention policies.

Incident Response

In the unlikely event of a security incident, we have a documented response plan:

1

Detection & Analysis

Identify and assess the scope of the incident

2

Containment

Isolate affected systems to prevent spread

3

Notification

Alert affected customers within 72 hours per GDPR

4

Recovery & Review

Restore services and conduct post-incident analysis

Security Contact: Report security concerns to security@certivo.io

πŸ’Ύ Data Protection

Your Data is Safe

We implement multiple layers of protection to ensure your data is always available, never lost, and protected against unauthorized access.

πŸ”„

Automated Backups

Continuous backups with point-in-time recovery. Your data is replicated across multiple geographic regions.

  • β€’ Daily full backups
  • β€’ Continuous transaction logs
  • β€’ 35-day backup retention
  • β€’ Cross-region replication
πŸ—οΈ

Business Continuity

Designed for 99.9% uptime with automatic failover and disaster recovery capabilities built into our architecture.

  • β€’ Multi-AZ deployment
  • β€’ Automatic failover
  • β€’ RTO: 4 hours
  • β€’ RPO: 1 hour
πŸ—‘οΈ

Data Deletion

When you delete data or close your account, we ensure complete removal from all systems including backups.

  • β€’ Immediate soft delete
  • β€’ 30-day recovery window
  • β€’ Permanent purge after retention
  • β€’ Backup purge within 90 days
🏒

Data Isolation

Each organization's data is logically isolated. Your data is never accessible to other customers.

  • β€’ Tenant isolation at database level
  • β€’ Organization-scoped data access
  • β€’ Network-level segmentation
  • β€’ Audit logging per tenant

Compliance & Infrastructure

Certivo is built on AWS infrastructure and designed to meet regulatory requirements for electronic signatures in regulated industries.

☁️

AWS Infrastructure

Hosted on SOC 2 Type II certified AWS data centers with enterprise-grade security

πŸ‡ͺπŸ‡Ί

GDPR Compliant

Full compliance with EU data protection requirements

πŸ“‹

FDA 21 CFR Part 11

Designed to meet electronic signature requirements for regulated industries

For detailed compliance documentation, please contact us.

Ready to Get Started?

Join organizations that trust Certivo for secure, compliant electronic signatures.