Encryption related question

Hi,
Thank you for your time.
My client has some questions about the encryption aspect of how 8th wall handles (see questions below), but I didn’t find the answers on the website. Can you help me with these questions?
Thank you!

  • What encryption protocol is employed for data in motion? (Is it HTTPS, TLS 1.2, or another method?)
  • What encryption method is utilized for data at rest? (For instance, AES-256, Transparent Data Encryption (TDE), etc.)
  • Are auditing and logging turned on for all systems? (Application/infrastructure, logs/monitoring)

Hi @lily_hsiao our team will respond to this shortly, our team member who focuses on this is currently OOO.

Hi @lily_hsiao,

All 8th Wall infrastructure resides in AWS and follows architecture, configuration and security best practices. We leverage global infrastructure and highly available service configurations across many AWS regions.

Please refer to the following URLs related to privacy, data processing and operational measures:

Specifically, 8th Wall hosting is powered by AWS CloudFront, a managed service with 600+ (and always growing) points of presence around the globe - AWS ensures the availability and security of their underlying hosting platform:

To answer your specific questions, HTTPS/TLS is used for encrypting data in motion, and various built-in AWS Storage encryption technologies are used for data at rest (things like S3 encryption, RDS encryption, etc) and yes, our infrastructure is monitored, audited and logged as appropriate based on the service.

3 Likes

Thank you so much for your detailed answer!

1 Like

This topic was automatically closed 4 days after the last reply. New replies are no longer allowed.