Data Security

AppNavi sets the highest standards for data security and processing. We follow established best practices to ensure the best possible data protection for our customers.

Data at Rest

AppNavi essentially uses AWS DynamoDB and the AWS S3 service to store the data. Data in both services is stored encrypted to protect the information. The distribution of data across different services also makes it more difficult for attackers to steal data.

Data Being Used

AWS IAM ensures that only users with the appropriate access rights are given access to data and settings that they really need. All logins and accesses as well as actions are logged seamlessly. In AppNavi itself, a multi-level authorisation system ensures that data access is also only possible for users with the appropriate permissions.

Data in Transit

A major attack vector is generally the transmission of data. There is always the danger that an attacker reads or even modifies this data stream. Therefore, we rely on current security standards regarding the transmission of data via HTTPS and SSL. We only use secure cyphers to make it as difficult as possible for attackers.

In addition to the above, we implement the following mechanisms:

  • Data is validated and sanitized upon entry: All data that flows into our system via the interface or API is validated. This way we can ensure that no malicious code enters our system.
  • All data is encrypted: All data stored in our systems is encrypted. This makes it particularly difficult for attackers to access and use this data. We use the latest AWS Cloud security standards for this.
  • Data is protected and has a well-tested recovery plan: Our entire AppNavi system is monitored seamlessly. For this purpose, we use the standard services of the AWS Cloud as well as additional software that informs us at an early stage about occurring problems and security incidents. Our backup and recovery plans are regularly tested and audited.
  • There is a strict data retention policy: Our policies determine how long the various data classes are kept. The deletion routines are automated to ensure that the data is reliably deleted.