SlideShare a Scribd company logo
1 of 10
Data Security Overview
Data Security Measures
 ISO 27001 Information Security
 Physical security
 Network and system security
 Storage security
 Application security
 People processes
 Disaster recovery
 On-premise servers
ISO/IEC 27001
Information Security
• ISO/IEC 27001 is an international standard to manage information security,
originally published jointly by the International Organization for
Standardization (ISO) and the International Electrotechnical Commission
(IEC) in 2005 and revised again in 2013. It details requirements for
establishing, implementing, maintaining and continually improving an
Information Security Management System (ISMS) – the aim of which is to
help organizations make the information assets they hold more secure.
• Ragic Database has been certified compliant with the ISO/IEC 27001 :
2013 standard. We implement information security protection and
prevention measures in accordance with relevant governance methods.
A holistic and best-known international standard
for ISMS
Physical Server Security
Our servers are provided by well-known public clouds (Google, AWS),
with features including:
• Annual audits for the following standards: ISO 27001, SOC1, SSAE16
/ ISAE 3402 Type II: SOC 2, SOC 3, PCI DSS v3.0
• Information Security Team consisting of more than 500 top experts
• Custom-designed electronic access cards, alarms, vehicle access
barriers, perimeter fencing, metal detectors, and biometrics
World-class cloud service providers ensure the
physical security of our servers
Network and system security
• SSL encryption
– All data transmission support bank level HTTPS/SSL encryption
– SSL encryption are always enforced when sending sensitive
information
– Support TLS 1.2 and TLS 1.3. Click here for detailed report.
• Intrusion detection
– Packets sent to servers will go through a series of strict firewall rules
and application level intrusion detection and blocking program to
stop malicious requests and IP at real time
• Complete audit logs
– All requests, system events, application events, database events are
logged and ready for expert analysis
– Periodic review of all logs to make adjustments for new defense
policies
Encryption, intrusion detection, and auditing logs
Storage security
• Disk Encryption
– All data written to disk is encrypted on the fly and then transmitted
and stored in encrypted form. Conforming to ISO 27001, SSAE-16,
SOC 1, SOC 2, and SOC 3 certifications.
• RAID storage
– All data are mirror to multiple RAID hard disks, ensuring your data is
safe from hard disk failures
• Server Backup
– All servers are backed up daily to a different set of persistent
storage
• Database Backup
– All customer databases are backed up to a different location for
disaster recovery
Disk Encryption, RAID storage, and backups
Application security
• Database security
– Ragic's database has an unique design that does not support SQL or
any other query language. There is zero chance of SQL or script
injection.
– Different tenant's database are store on separate physical files,
ensuring zero chance of application level sharing exploits from
other accounts
• Periodic security scan
– We work with major service providers to do periodic security scan
on all possible weaknesses to ensure your data safety
• Regular security updates
– Our system administrator monitor security updates very closely and
apply patches to deflect zero day attacks
A robust application architecture is the most
important line of defense for your data
People processes
• Data access control
– Nobody, including system administrators at Ragic, cannot access
your data without your permission
– When providing technical support, we can only see your database
design, but not your data by default
• No database management interface
– Unlike most other databases, there is no interface to manage
databases or play around with your data. Without such feature, your
data is safe from any unauthorized access to your data via database
consoles or any management interfaces
• Complete access log
– All data access are logged and special events are reviewed regularly
Nobody can access your data without your
permission
Disaster recovery
• System wide backups
– All Ragic servers are fully backed up on a daily basis to ensure
service can be quickly recovered in case of any problem
• Account database backups
– For professional plans and above, accounts have their own
individual full daily, 3-day, and weekly database backups to a
different location on a service by a different provider to ensure that
you can restore your data in any situation
– We also allow you to manually backup, take snapshots, or restore
your account database with a backup yourself
• Manual backups
– Ragic also allow users to manually backup and download your data
to manage your backups yourself
Multiple layers of backup to keep you from data loss
On-premise servers
• You can host Ragic on your own servers if necessary,
provided that your organization have the ability to
maintain your own servers.
• With Ragic's backup and restore feature, you can move
your hosted account to your on-premise server any time,
or move your on-premise account to hosted accounts.
• We strongly recommend companies to only use on-
premise servers if they have an experienced IT crew who
understands how to maintain and keep a server safe and
secure.
The option to host your database on your own server

More Related Content

Similar to Ragic - Data Security Overview

Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
KoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginnersKoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginnersTobias Koprowski
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Networkzaisahil
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
MySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Day Paris 2016 - MySQL Enterprise EditionMySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Day Paris 2016 - MySQL Enterprise EditionOlivier DASINI
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessStorage Switzerland
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 

Similar to Ragic - Data Security Overview (20)

Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Operating system security
Operating system securityOperating system security
Operating system security
 
KoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginnersKoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginners
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
MySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Day Paris 2016 - MySQL Enterprise EditionMySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Day Paris 2016 - MySQL Enterprise Edition
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Chapter08
Chapter08Chapter08
Chapter08
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 

More from Ragic

Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Ragic
 
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic
 
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Ragic
 
Ragic 資訊安全簡介
Ragic 資訊安全簡介Ragic 資訊安全簡介
Ragic 資訊安全簡介Ragic
 
Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101Ragic
 
Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic
 
找 CRM 該認識的六個分類
找 CRM 該認識的六個分類找 CRM 該認識的六個分類
找 CRM 該認識的六個分類Ragic
 
關於 Ragic 的 10 個快問快答
關於 Ragic 的 10 個快問快答關於 Ragic 的 10 個快問快答
關於 Ragic 的 10 個快問快答Ragic
 
Ragic 條碼功能簡介
Ragic 條碼功能簡介Ragic 條碼功能簡介
Ragic 條碼功能簡介Ragic
 
Integrating Ragic With Your Existing Systems
Integrating Ragic With Your Existing SystemsIntegrating Ragic With Your Existing Systems
Integrating Ragic With Your Existing SystemsRagic
 
Ragic 整合方式彙整
Ragic 整合方式彙整Ragic 整合方式彙整
Ragic 整合方式彙整Ragic
 
Ragic Quick Guide: Frequently Asked Questions & Answers
Ragic Quick Guide: Frequently Asked Questions & AnswersRagic Quick Guide: Frequently Asked Questions & Answers
Ragic Quick Guide: Frequently Asked Questions & AnswersRagic
 
體溫測量資料填寫家長學生使用說明
體溫測量資料填寫家長學生使用說明體溫測量資料填寫家長學生使用說明
體溫測量資料填寫家長學生使用說明Ragic
 
體溫測量範本學校老師使用說明
體溫測量範本學校老師使用說明體溫測量範本學校老師使用說明
體溫測量範本學校老師使用說明Ragic
 
Ragic - 財會系統介紹
Ragic - 財會系統介紹Ragic - 財會系統介紹
Ragic - 財會系統介紹Ragic
 
Ragic - 庫存模組介紹
Ragic - 庫存模組介紹Ragic - 庫存模組介紹
Ragic - 庫存模組介紹Ragic
 
Ragic - 採購模組介紹
Ragic - 採購模組介紹Ragic - 採購模組介紹
Ragic - 採購模組介紹Ragic
 
Ragic - 訂單管理模組介紹
Ragic - 訂單管理模組介紹Ragic - 訂單管理模組介紹
Ragic - 訂單管理模組介紹Ragic
 
Ragic - ERP模組介紹
Ragic - ERP模組介紹Ragic - ERP模組介紹
Ragic - ERP模組介紹Ragic
 
Ragic Database design 101
Ragic Database design 101Ragic Database design 101
Ragic Database design 101Ragic
 

More from Ragic (20)

Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
 
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
 
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
 
Ragic 資訊安全簡介
Ragic 資訊安全簡介Ragic 資訊安全簡介
Ragic 資訊安全簡介
 
Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101
 
Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具
 
找 CRM 該認識的六個分類
找 CRM 該認識的六個分類找 CRM 該認識的六個分類
找 CRM 該認識的六個分類
 
關於 Ragic 的 10 個快問快答
關於 Ragic 的 10 個快問快答關於 Ragic 的 10 個快問快答
關於 Ragic 的 10 個快問快答
 
Ragic 條碼功能簡介
Ragic 條碼功能簡介Ragic 條碼功能簡介
Ragic 條碼功能簡介
 
Integrating Ragic With Your Existing Systems
Integrating Ragic With Your Existing SystemsIntegrating Ragic With Your Existing Systems
Integrating Ragic With Your Existing Systems
 
Ragic 整合方式彙整
Ragic 整合方式彙整Ragic 整合方式彙整
Ragic 整合方式彙整
 
Ragic Quick Guide: Frequently Asked Questions & Answers
Ragic Quick Guide: Frequently Asked Questions & AnswersRagic Quick Guide: Frequently Asked Questions & Answers
Ragic Quick Guide: Frequently Asked Questions & Answers
 
體溫測量資料填寫家長學生使用說明
體溫測量資料填寫家長學生使用說明體溫測量資料填寫家長學生使用說明
體溫測量資料填寫家長學生使用說明
 
體溫測量範本學校老師使用說明
體溫測量範本學校老師使用說明體溫測量範本學校老師使用說明
體溫測量範本學校老師使用說明
 
Ragic - 財會系統介紹
Ragic - 財會系統介紹Ragic - 財會系統介紹
Ragic - 財會系統介紹
 
Ragic - 庫存模組介紹
Ragic - 庫存模組介紹Ragic - 庫存模組介紹
Ragic - 庫存模組介紹
 
Ragic - 採購模組介紹
Ragic - 採購模組介紹Ragic - 採購模組介紹
Ragic - 採購模組介紹
 
Ragic - 訂單管理模組介紹
Ragic - 訂單管理模組介紹Ragic - 訂單管理模組介紹
Ragic - 訂單管理模組介紹
 
Ragic - ERP模組介紹
Ragic - ERP模組介紹Ragic - ERP模組介紹
Ragic - ERP模組介紹
 
Ragic Database design 101
Ragic Database design 101Ragic Database design 101
Ragic Database design 101
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

Ragic - Data Security Overview

  • 2. Data Security Measures  ISO 27001 Information Security  Physical security  Network and system security  Storage security  Application security  People processes  Disaster recovery  On-premise servers
  • 3. ISO/IEC 27001 Information Security • ISO/IEC 27001 is an international standard to manage information security, originally published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005 and revised again in 2013. It details requirements for establishing, implementing, maintaining and continually improving an Information Security Management System (ISMS) – the aim of which is to help organizations make the information assets they hold more secure. • Ragic Database has been certified compliant with the ISO/IEC 27001 : 2013 standard. We implement information security protection and prevention measures in accordance with relevant governance methods. A holistic and best-known international standard for ISMS
  • 4. Physical Server Security Our servers are provided by well-known public clouds (Google, AWS), with features including: • Annual audits for the following standards: ISO 27001, SOC1, SSAE16 / ISAE 3402 Type II: SOC 2, SOC 3, PCI DSS v3.0 • Information Security Team consisting of more than 500 top experts • Custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics World-class cloud service providers ensure the physical security of our servers
  • 5. Network and system security • SSL encryption – All data transmission support bank level HTTPS/SSL encryption – SSL encryption are always enforced when sending sensitive information – Support TLS 1.2 and TLS 1.3. Click here for detailed report. • Intrusion detection – Packets sent to servers will go through a series of strict firewall rules and application level intrusion detection and blocking program to stop malicious requests and IP at real time • Complete audit logs – All requests, system events, application events, database events are logged and ready for expert analysis – Periodic review of all logs to make adjustments for new defense policies Encryption, intrusion detection, and auditing logs
  • 6. Storage security • Disk Encryption – All data written to disk is encrypted on the fly and then transmitted and stored in encrypted form. Conforming to ISO 27001, SSAE-16, SOC 1, SOC 2, and SOC 3 certifications. • RAID storage – All data are mirror to multiple RAID hard disks, ensuring your data is safe from hard disk failures • Server Backup – All servers are backed up daily to a different set of persistent storage • Database Backup – All customer databases are backed up to a different location for disaster recovery Disk Encryption, RAID storage, and backups
  • 7. Application security • Database security – Ragic's database has an unique design that does not support SQL or any other query language. There is zero chance of SQL or script injection. – Different tenant's database are store on separate physical files, ensuring zero chance of application level sharing exploits from other accounts • Periodic security scan – We work with major service providers to do periodic security scan on all possible weaknesses to ensure your data safety • Regular security updates – Our system administrator monitor security updates very closely and apply patches to deflect zero day attacks A robust application architecture is the most important line of defense for your data
  • 8. People processes • Data access control – Nobody, including system administrators at Ragic, cannot access your data without your permission – When providing technical support, we can only see your database design, but not your data by default • No database management interface – Unlike most other databases, there is no interface to manage databases or play around with your data. Without such feature, your data is safe from any unauthorized access to your data via database consoles or any management interfaces • Complete access log – All data access are logged and special events are reviewed regularly Nobody can access your data without your permission
  • 9. Disaster recovery • System wide backups – All Ragic servers are fully backed up on a daily basis to ensure service can be quickly recovered in case of any problem • Account database backups – For professional plans and above, accounts have their own individual full daily, 3-day, and weekly database backups to a different location on a service by a different provider to ensure that you can restore your data in any situation – We also allow you to manually backup, take snapshots, or restore your account database with a backup yourself • Manual backups – Ragic also allow users to manually backup and download your data to manage your backups yourself Multiple layers of backup to keep you from data loss
  • 10. On-premise servers • You can host Ragic on your own servers if necessary, provided that your organization have the ability to maintain your own servers. • With Ragic's backup and restore feature, you can move your hosted account to your on-premise server any time, or move your on-premise account to hosted accounts. • We strongly recommend companies to only use on- premise servers if they have an experienced IT crew who understands how to maintain and keep a server safe and secure. The option to host your database on your own server

Editor's Notes

  1. AWS Security : Compliance - Introduction to AWS Security (amazon.com) PCI 合規 – Amazon Web Services (AWS) New SOC 1, 2, and 3 Reports Available — Including a New Region and Service In-Scope | AWS Security Blog (amazon.com) Azure Security: ISO/IEC 27001 - Azure Compliance | Microsoft Learn Azure compliance documentation | Microsoft Learn Security, Privacy & Compliance Update: Availability of SSAE 16 / ISAE 3402 Attestation | Azure Blog and Updates | Microsoft Azure PCI DSS - Azure Compliance | Microsoft Learn SSAE-16 = SOC1(雲端安全治理及雲端驗證稽核標準探討(下篇),Information Security 資安人科技網)