Security Policy

At Regystra, we are dedicated to protecting our customers' data by implementing robust security measures across our services and infrastructure. Our Security Policy outlines the key practices we follow to ensure data integrity, user privacy, secure payment processing, and reliable hosting.

Data Security

  • Comprehensive Security Program: We maintain an information security program that includes assessment, education, protection, detection, and response to security incidents, adhering to industry standards and best practices.
  • Regular Vulnerability Scans: Our production environments undergo regular automated scans to promptly identify and address vulnerabilities and missing patches.
  • Proactive Threat Monitoring: We monitor security alerts from reputable sources, such as the Department of Homeland Security's US-CERT, to stay informed about emerging threats.
  • Malware Protection: Anti-virus and anti-malware protections are deployed across all production systems and networks to prevent unauthorized access and data breaches.
  • Firewall Management: We continuously review firewall traffic and update firewall policies to ensure only legitimate traffic is permitted.
  • Data Encryption: Sensitive data is protected during transmission using strong encryption methods, and we employ data encryption at rest, tokenization, and data masking where appropriate.

Payment Processing Security

  • Trusted Payment Partners: We utilize reputable payment processing partners, including Stripe, Authorize.net, PayPal, and MercadoPago, to handle and securely store credit card data. These partners are certified as PCI Level 1 Service Providers and are listed on the VISA Global Registry of Service Providers.
  • Outsourced Cardholder Data Functions: Regystra does not directly process or store credit card information, ensuring that sensitive payment data is managed by our compliant partners.

Hosting Security

  • Secure Cloud Infrastructure: Our services are hosted on Amazon Web Services (AWS), a PCI-compliant provider with industry-standard SOC 1 and SOC 2 certifications. Learn more about AWS Security
  • Robust Security Measures: AWS implements multi-factor authentication, role-based access controls (RBAC), redundant utilities, and strict change management processes to safeguard our infrastructure.
  • Regular Backups: We perform regular backups to ensure data integrity and availability, leveraging AWS's secure backup solutions.

Security Assessments

  • Regular Audits and Testing: We conduct regular security audits and penetration testing to evaluate the effectiveness of our security controls and identify potential vulnerabilities.
  • Prompt Remediation: Findings from these assessments are addressed promptly to continuously enhance our security posture.

For more information on our security practices or to report potential security concerns, please contact our security team at info@ciotech.ca.