Ragic - Data Security Overview

Ragic
RagicDeveloper at Ragic
Data Security Overview
Data Security Measures
 ISO 27001 Information Security
 Physical security
 Network and system security
 Storage security
 Application security
 People processes
 Disaster recovery
 On-premise servers
ISO/IEC 27001
Information Security
• ISO/IEC 27001 is an international standard to manage information security,
originally published jointly by the International Organization for
Standardization (ISO) and the International Electrotechnical Commission
(IEC) in 2005 and revised again in 2013. It details requirements for
establishing, implementing, maintaining and continually improving an
Information Security Management System (ISMS) – the aim of which is to
help organizations make the information assets they hold more secure.
• Ragic Database has been certified compliant with the ISO/IEC 27001 :
2013 standard. We implement information security protection and
prevention measures in accordance with relevant governance methods.
A holistic and best-known international standard
for ISMS
Physical Server Security
Our servers are provided by well-known public clouds (Google, AWS),
with features including:
• Annual audits for the following standards: ISO 27001, SOC1, SSAE16
/ ISAE 3402 Type II: SOC 2, SOC 3, PCI DSS v3.0
• Information Security Team consisting of more than 500 top experts
• Custom-designed electronic access cards, alarms, vehicle access
barriers, perimeter fencing, metal detectors, and biometrics
World-class cloud service providers ensure the
physical security of our servers
Network and system security
• SSL encryption
– All data transmission support bank level HTTPS/SSL encryption
– SSL encryption are always enforced when sending sensitive
information
– Support TLS 1.2 and TLS 1.3. Click here for detailed report.
• Intrusion detection
– Packets sent to servers will go through a series of strict firewall rules
and application level intrusion detection and blocking program to
stop malicious requests and IP at real time
• Complete audit logs
– All requests, system events, application events, database events are
logged and ready for expert analysis
– Periodic review of all logs to make adjustments for new defense
policies
Encryption, intrusion detection, and auditing logs
Storage security
• Disk Encryption
– All data written to disk is encrypted on the fly and then transmitted
and stored in encrypted form. Conforming to ISO 27001, SSAE-16,
SOC 1, SOC 2, and SOC 3 certifications.
• RAID storage
– All data are mirror to multiple RAID hard disks, ensuring your data is
safe from hard disk failures
• Server Backup
– All servers are backed up daily to a different set of persistent
storage
• Database Backup
– All customer databases are backed up to a different location for
disaster recovery
Disk Encryption, RAID storage, and backups
Application security
• Database security
– Ragic's database has an unique design that does not support SQL or
any other query language. There is zero chance of SQL or script
injection.
– Different tenant's database are store on separate physical files,
ensuring zero chance of application level sharing exploits from
other accounts
• Periodic security scan
– We work with major service providers to do periodic security scan
on all possible weaknesses to ensure your data safety
• Regular security updates
– Our system administrator monitor security updates very closely and
apply patches to deflect zero day attacks
A robust application architecture is the most
important line of defense for your data
People processes
• Data access control
– Nobody, including system administrators at Ragic, cannot access
your data without your permission
– When providing technical support, we can only see your database
design, but not your data by default
• No database management interface
– Unlike most other databases, there is no interface to manage
databases or play around with your data. Without such feature, your
data is safe from any unauthorized access to your data via database
consoles or any management interfaces
• Complete access log
– All data access are logged and special events are reviewed regularly
Nobody can access your data without your
permission
Disaster recovery
• System wide backups
– All Ragic servers are fully backed up on a daily basis to ensure
service can be quickly recovered in case of any problem
• Account database backups
– For professional plans and above, accounts have their own
individual full daily, 3-day, and weekly database backups to a
different location on a service by a different provider to ensure that
you can restore your data in any situation
– We also allow you to manually backup, take snapshots, or restore
your account database with a backup yourself
• Manual backups
– Ragic also allow users to manually backup and download your data
to manage your backups yourself
Multiple layers of backup to keep you from data loss
On-premise servers
• You can host Ragic on your own servers if necessary,
provided that your organization have the ability to
maintain your own servers.
• With Ragic's backup and restore feature, you can move
your hosted account to your on-premise server any time,
or move your on-premise account to hosted accounts.
• We strongly recommend companies to only use on-
premise servers if they have an experienced IT crew who
understands how to maintain and keep a server safe and
secure.
The option to host your database on your own server
1 of 10

Recommended

First Cloud based enterprise Backup & Recovery in India by
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaBlaze Arizanov
617 views10 slides
Information Security Lesson 4 - Baselines - Eric Vanderburg by
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgEric Vanderburg
591 views21 slides
Využijte svou Oracle databázi na maximum! by
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
117 views50 slides
Proact backup and storage vs ransomware 2021 by
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Karel Kannel
147 views29 slides
Information Security Whitepaper by
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
78 views13 slides
EventLog Analyzer - Product overview by
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overviewManageEngine EventLog Analyzer
2.6K views19 slides

More Related Content

Similar to Ragic - Data Security Overview

Supporting Contractors with NIST SP 800-171 Compliance by
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
733 views27 slides
Material best practices in network security using ethical hacking by
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
4.7K views196 slides
Operating system security by
Operating system securityOperating system security
Operating system securityRamesh Ogania
18.6K views33 slides
KoprowskiT_SQLSatDenmark_WASDforBeginners by
KoprowskiT_SQLSatDenmark_WASDforBeginnersKoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginnersTobias Koprowski
446 views75 slides
MCSA 70-412 Chapter 12 by
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12Computer Networking
772 views28 slides
CIA-Triad-Presentation.pdf by
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
31 views30 slides

Similar to Ragic - Data Security Overview(20)

Supporting Contractors with NIST SP 800-171 Compliance by SolarWinds
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
SolarWinds733 views
Material best practices in network security using ethical hacking by Desmond Devendran
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran4.7K views
Operating system security by Ramesh Ogania
Operating system securityOperating system security
Operating system security
Ramesh Ogania18.6K views
KoprowskiT_SQLSatDenmark_WASDforBeginners by Tobias Koprowski
KoprowskiT_SQLSatDenmark_WASDforBeginnersKoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLSatDenmark_WASDforBeginners
Tobias Koprowski446 views
CIA-Triad-Presentation.pdf by BabyBoy55
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy5531 views
Monitoring and Reporting on IBM i Compliance and Security by Precisely
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
Precisely557 views
DGI Compliance Webinar by SolarWinds
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
SolarWinds536 views
Administrating Your Network by zaisahil
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
zaisahil164 views
CSE_Instructor_Materials_Chapter7.pptx by Mohammad512578
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad5125789 views
Best Practices for implementing Database Security Comprehensive Database Secu... by Kal BO
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO339 views
MySQL Day Paris 2016 - MySQL Enterprise Edition by Olivier DASINI
MySQL Day Paris 2016 - MySQL Enterprise EditionMySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Day Paris 2016 - MySQL Enterprise Edition
Olivier DASINI2.2K views
Securing Your MongoDB Deployment by MongoDB
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
MongoDB4.3K views
Government and Education Webinar: There's More Than One Way to Monitor SQL Da... by SolarWinds
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds365 views
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success by Storage Switzerland
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Log Monitoring and File Integrity Monitoring by Kimberly Simon MBA
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
Kimberly Simon MBA964 views

More from Ragic

Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール by
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic
5 views36 slides
Introduction to Ragic - #1 No Code tool for digitalizing your business proces... by
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Ragic
201 views38 slides
Ragic 資訊安全簡介 by
Ragic 資訊安全簡介Ragic 資訊安全簡介
Ragic 資訊安全簡介Ragic
40 views10 slides
Diseño de Base de Datos Ragic 101 by
Diseño de Base de Datos Ragic 101Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101Ragic
76 views127 slides
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc... by
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Ragic
44 views35 slides
Ragic 簡介 - 最強大的 No Code 企業電子化工具 by
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic
1.9K views37 slides

More from Ragic(20)

Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール by Ragic
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツールRagic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic紹介 - ビジネスプロセスのDX化:最強のノーコードツール
Ragic5 views
Introduction to Ragic - #1 No Code tool for digitalizing your business proces... by Ragic
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Introduction to Ragic - #1 No Code tool for digitalizing your business proces...
Ragic201 views
Ragic 資訊安全簡介 by Ragic
Ragic 資訊安全簡介Ragic 資訊安全簡介
Ragic 資訊安全簡介
Ragic40 views
Diseño de Base de Datos Ragic 101 by Ragic
Diseño de Base de Datos Ragic 101Diseño de Base de Datos Ragic 101
Diseño de Base de Datos Ragic 101
Ragic76 views
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc... by Ragic
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Introducción a Ragic - La herramienta #1 sin código para digitalizar tus proc...
Ragic44 views
Ragic 簡介 - 最強大的 No Code 企業電子化工具 by Ragic
Ragic 簡介 - 最強大的 No Code 企業電子化工具Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic 簡介 - 最強大的 No Code 企業電子化工具
Ragic1.9K views
找 CRM 該認識的六個分類 by Ragic
找 CRM 該認識的六個分類找 CRM 該認識的六個分類
找 CRM 該認識的六個分類
Ragic5.5K views
關於 Ragic 的 10 個快問快答 by Ragic
關於 Ragic 的 10 個快問快答關於 Ragic 的 10 個快問快答
關於 Ragic 的 10 個快問快答
Ragic20.7K views
Ragic 條碼功能簡介 by Ragic
Ragic 條碼功能簡介Ragic 條碼功能簡介
Ragic 條碼功能簡介
Ragic210 views
Integrating Ragic With Your Existing Systems by Ragic
Integrating Ragic With Your Existing SystemsIntegrating Ragic With Your Existing Systems
Integrating Ragic With Your Existing Systems
Ragic155 views
Ragic 整合方式彙整 by Ragic
Ragic 整合方式彙整Ragic 整合方式彙整
Ragic 整合方式彙整
Ragic349 views
Ragic Quick Guide: Frequently Asked Questions & Answers by Ragic
Ragic Quick Guide: Frequently Asked Questions & AnswersRagic Quick Guide: Frequently Asked Questions & Answers
Ragic Quick Guide: Frequently Asked Questions & Answers
Ragic974 views
體溫測量資料填寫家長學生使用說明 by Ragic
體溫測量資料填寫家長學生使用說明體溫測量資料填寫家長學生使用說明
體溫測量資料填寫家長學生使用說明
Ragic1.3K views
體溫測量範本學校老師使用說明 by Ragic
體溫測量範本學校老師使用說明體溫測量範本學校老師使用說明
體溫測量範本學校老師使用說明
Ragic1.2K views
Ragic - 財會系統介紹 by Ragic
Ragic - 財會系統介紹Ragic - 財會系統介紹
Ragic - 財會系統介紹
Ragic6.5K views
Ragic - 庫存模組介紹 by Ragic
Ragic - 庫存模組介紹Ragic - 庫存模組介紹
Ragic - 庫存模組介紹
Ragic20.5K views
Ragic - 採購模組介紹 by Ragic
Ragic - 採購模組介紹Ragic - 採購模組介紹
Ragic - 採購模組介紹
Ragic13.5K views
Ragic - 訂單管理模組介紹 by Ragic
Ragic - 訂單管理模組介紹Ragic - 訂單管理模組介紹
Ragic - 訂單管理模組介紹
Ragic23.6K views
Ragic - ERP模組介紹 by Ragic
Ragic - ERP模組介紹Ragic - ERP模組介紹
Ragic - ERP模組介紹
Ragic895 views
Ragic Database design 101 by Ragic
Ragic Database design 101Ragic Database design 101
Ragic Database design 101
Ragic2.7K views

Recently uploaded

Quality Engineer: A Day in the Life by
Quality Engineer: A Day in the LifeQuality Engineer: A Day in the Life
Quality Engineer: A Day in the LifeJohn Valentino
7 views18 slides
Programming Field by
Programming FieldProgramming Field
Programming Fieldthehardtechnology
6 views9 slides
Introduction to Gradle by
Introduction to GradleIntroduction to Gradle
Introduction to GradleJohn Valentino
5 views7 slides
tecnologia18.docx by
tecnologia18.docxtecnologia18.docx
tecnologia18.docxnosi6702
5 views5 slides
360 graden fabriek by
360 graden fabriek360 graden fabriek
360 graden fabriekinfo33492
143 views25 slides
JioEngage_Presentation.pptx by
JioEngage_Presentation.pptxJioEngage_Presentation.pptx
JioEngage_Presentation.pptxadmin125455
6 views4 slides

Recently uploaded(20)

Quality Engineer: A Day in the Life by John Valentino
Quality Engineer: A Day in the LifeQuality Engineer: A Day in the Life
Quality Engineer: A Day in the Life
John Valentino7 views
tecnologia18.docx by nosi6702
tecnologia18.docxtecnologia18.docx
tecnologia18.docx
nosi67025 views
360 graden fabriek by info33492
360 graden fabriek360 graden fabriek
360 graden fabriek
info33492143 views
JioEngage_Presentation.pptx by admin125455
JioEngage_Presentation.pptxJioEngage_Presentation.pptx
JioEngage_Presentation.pptx
admin1254556 views
FIMA 2023 Neo4j & FS - Entity Resolution.pptx by Neo4j
FIMA 2023 Neo4j & FS - Entity Resolution.pptxFIMA 2023 Neo4j & FS - Entity Resolution.pptx
FIMA 2023 Neo4j & FS - Entity Resolution.pptx
Neo4j17 views
ADDO_2022_CICID_Tom_Halpin.pdf by TomHalpin9
ADDO_2022_CICID_Tom_Halpin.pdfADDO_2022_CICID_Tom_Halpin.pdf
ADDO_2022_CICID_Tom_Halpin.pdf
TomHalpin95 views
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx by animuscrm
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
animuscrm15 views
Understanding HTML terminology by artembondar5
Understanding HTML terminologyUnderstanding HTML terminology
Understanding HTML terminology
artembondar56 views
Fleet Management Software in India by Fleetable
Fleet Management Software in India Fleet Management Software in India
Fleet Management Software in India
Fleetable12 views
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P... by NimaTorabi2
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
NimaTorabi215 views
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation by HCLSoftware
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook AutomationDRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
HCLSoftware6 views
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated... by TomHalpin9
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...
TomHalpin96 views
Introduction to Git Source Control by John Valentino
Introduction to Git Source ControlIntroduction to Git Source Control
Introduction to Git Source Control
John Valentino6 views

Ragic - Data Security Overview

  • 2. Data Security Measures  ISO 27001 Information Security  Physical security  Network and system security  Storage security  Application security  People processes  Disaster recovery  On-premise servers
  • 3. ISO/IEC 27001 Information Security • ISO/IEC 27001 is an international standard to manage information security, originally published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005 and revised again in 2013. It details requirements for establishing, implementing, maintaining and continually improving an Information Security Management System (ISMS) – the aim of which is to help organizations make the information assets they hold more secure. • Ragic Database has been certified compliant with the ISO/IEC 27001 : 2013 standard. We implement information security protection and prevention measures in accordance with relevant governance methods. A holistic and best-known international standard for ISMS
  • 4. Physical Server Security Our servers are provided by well-known public clouds (Google, AWS), with features including: • Annual audits for the following standards: ISO 27001, SOC1, SSAE16 / ISAE 3402 Type II: SOC 2, SOC 3, PCI DSS v3.0 • Information Security Team consisting of more than 500 top experts • Custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics World-class cloud service providers ensure the physical security of our servers
  • 5. Network and system security • SSL encryption – All data transmission support bank level HTTPS/SSL encryption – SSL encryption are always enforced when sending sensitive information – Support TLS 1.2 and TLS 1.3. Click here for detailed report. • Intrusion detection – Packets sent to servers will go through a series of strict firewall rules and application level intrusion detection and blocking program to stop malicious requests and IP at real time • Complete audit logs – All requests, system events, application events, database events are logged and ready for expert analysis – Periodic review of all logs to make adjustments for new defense policies Encryption, intrusion detection, and auditing logs
  • 6. Storage security • Disk Encryption – All data written to disk is encrypted on the fly and then transmitted and stored in encrypted form. Conforming to ISO 27001, SSAE-16, SOC 1, SOC 2, and SOC 3 certifications. • RAID storage – All data are mirror to multiple RAID hard disks, ensuring your data is safe from hard disk failures • Server Backup – All servers are backed up daily to a different set of persistent storage • Database Backup – All customer databases are backed up to a different location for disaster recovery Disk Encryption, RAID storage, and backups
  • 7. Application security • Database security – Ragic's database has an unique design that does not support SQL or any other query language. There is zero chance of SQL or script injection. – Different tenant's database are store on separate physical files, ensuring zero chance of application level sharing exploits from other accounts • Periodic security scan – We work with major service providers to do periodic security scan on all possible weaknesses to ensure your data safety • Regular security updates – Our system administrator monitor security updates very closely and apply patches to deflect zero day attacks A robust application architecture is the most important line of defense for your data
  • 8. People processes • Data access control – Nobody, including system administrators at Ragic, cannot access your data without your permission – When providing technical support, we can only see your database design, but not your data by default • No database management interface – Unlike most other databases, there is no interface to manage databases or play around with your data. Without such feature, your data is safe from any unauthorized access to your data via database consoles or any management interfaces • Complete access log – All data access are logged and special events are reviewed regularly Nobody can access your data without your permission
  • 9. Disaster recovery • System wide backups – All Ragic servers are fully backed up on a daily basis to ensure service can be quickly recovered in case of any problem • Account database backups – For professional plans and above, accounts have their own individual full daily, 3-day, and weekly database backups to a different location on a service by a different provider to ensure that you can restore your data in any situation – We also allow you to manually backup, take snapshots, or restore your account database with a backup yourself • Manual backups – Ragic also allow users to manually backup and download your data to manage your backups yourself Multiple layers of backup to keep you from data loss
  • 10. On-premise servers • You can host Ragic on your own servers if necessary, provided that your organization have the ability to maintain your own servers. • With Ragic's backup and restore feature, you can move your hosted account to your on-premise server any time, or move your on-premise account to hosted accounts. • We strongly recommend companies to only use on- premise servers if they have an experienced IT crew who understands how to maintain and keep a server safe and secure. The option to host your database on your own server

Editor's Notes

  1. AWS Security : Compliance - Introduction to AWS Security (amazon.com) PCI 合規 – Amazon Web Services (AWS) New SOC 1, 2, and 3 Reports Available — Including a New Region and Service In-Scope | AWS Security Blog (amazon.com) Azure Security: ISO/IEC 27001 - Azure Compliance | Microsoft Learn Azure compliance documentation | Microsoft Learn Security, Privacy & Compliance Update: Availability of SSAE 16 / ISAE 3402 Attestation | Azure Blog and Updates | Microsoft Azure PCI DSS - Azure Compliance | Microsoft Learn SSAE-16 = SOC1(雲端安全治理及雲端驗證稽核標準探討(下篇),Information Security 資安人科技網)