Dystech Security

Learn how Dystech handles security to make sure you are safe and secure.

Hugo Richard avatar
Written by Hugo Richard
Updated over a week ago

Introduction

Dystech's technology is hosted on Amazon Web Services (AWS) in Sydney. AWS

has certification for compliance with ISO/IEC 27001:2013, 27017:2015,

27018:2019, and ISO/IEC 9001:2015.

AWS is also fully compliant with applicable Data Protection Laws, and the AWS

Data Processing Agreement incorporates the Article 29 Working Party Model

Clauses.

Further details about the considerable measures Amazon takes in securing its

facilities and services can be found here:

Encryption, SSL and storage

  • All data exchanged with Dystech’s application and API is always transmitted via HTTPS using Secure Sockets Layer (SSL), a cryptographic protocol that is designed to protect against eavesdropping, tampering, and message forgery. The certificates Dystech uses are issued by AWS.

  • School/customer data is encrypted during transit and at rest to protect against unauthorised access to the underlying storage provided by AWS.

  • AWS uses the techniques detailed in DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process.

Monitoring

All servers and processes are monitored using a variety of enterprise-class

monitoring systems. AWS Cloud Watch provides our engineers with real-time

information on all aspects of Dystech infrastructure.

Backup and disaster recovery

- Dystech retains a point of time backup for 17 days after data is deleted.

- Our development team executes regular disaster recovery exercises to

make sure that the process runs smoothly and according to our disaster

recovery plan.

Did this answer your question?