Hi,
Thank you for your time.
My client has some questions about the encryption aspect of how 8th wall handles (see questions below), but I didn’t find the answers on the website. Can you help me with these questions?
Thank you!
What encryption protocol is employed for data in motion? (Is it HTTPS, TLS 1.2, or another method?)
What encryption method is utilized for data at rest? (For instance, AES-256, Transparent Data Encryption (TDE), etc.)
Are auditing and logging turned on for all systems? (Application/infrastructure, logs/monitoring)
All 8th Wall infrastructure resides in AWS and follows architecture, configuration and security best practices. We leverage global infrastructure and highly available service configurations across many AWS regions.
Please refer to the following URLs related to privacy, data processing and operational measures:
Specifically, 8th Wall hosting is powered by AWS CloudFront, a managed service with 600+ (and always growing) points of presence around the globe - AWS ensures the availability and security of their underlying hosting platform:
To answer your specific questions, HTTPS/TLS is used for encrypting data in motion, and various built-in AWS Storage encryption technologies are used for data at rest (things like S3 encryption, RDS encryption, etc) and yes, our infrastructure is monitored, audited and logged as appropriate based on the service.