Overview
Through the years, we have gone above and beyond to implement a security architecture based on industry-standard principles including separation of duties, role-based access control, data governance, and privacy-aware computing.
System Security
TMCopilot's SaaS solutions are implemented on the AWS (Amazon Web Services) platform — a leading cloud provider adopted by the most security-sensitive organizations such as Dow Jones, NASA, and the US Department of State.
AWS continuously evolves security features including identity management, access control, logging and monitoring, key management and encryption, networking intrusion detection, and DDoS protection.
TMCopilot leverages AWS and implements the following security measures:
- Two-factor authentication is required for developers who access the development environment, reducing the risk of impersonation and man-in-the-middle attacks.
- Network firewalls and HTTPS connections help encrypt traffic and protect data in transit.
- Microservice architecture and throttling thresholds help reduce compromise risk and mitigate DDoS attacks.
- Centralized log management and analysis help detect security breaches and vulnerabilities early.
- Role-based access control and separation of duties help make data and systems harder to compromise, including from insider threats.
- Regular data backup and redundancy of our database cluster, ensuring reliable disaster recovery.
- Key management and peripheral computing resources to reduce the risk of OS-level zero-day attacks.
- Modern CI/CD procedures to ensure separation of production, staging, and development environments.
Data Security
We adopted AWS S3, Aurora database, Lambda, Batch, EC2, and ECS for raw data collection, cleaning, and insight-driven discovery. Data redundancy and disaster recovery are built in with these services.
User historical activity data is stored in AWS Redshift clusters with secured connections throughout the internal data pipeline. Data is never touched by developers' personal computers and stays in the same AWS region to comply with privacy regulations such as GDPR.
User Privacy
Personally Identifiable Information (PII) is neither accessed by developers nor transferred outside of TMCopilot's AWS infrastructure to any third party. PII is separated from user activity history before we conduct aggregated user behavior studies.
We comply with GDPR to give users full control of their activity data and personal information. Upon request, we will delete all activity traces.
Our user terms and conditions can be found here.
Information Security in Software Development
We separate developers into groups with independent access to their scopes of work only. With our global team located in the US and China, the AWS functionalities and data each member can access are limited to their geolocation and job functions.
Conclusion
Security and privacy are active fields and best practices keep evolving. TMCopilot is dedicated to keeping up with the most recent advancements and providing a safe, reliable service to all users globally.
For questions or feedback, please reach out to us at contact@huski.ai.