Data Security

How does Udio manage data security and where is it stored?

Udio Systems cloud based software is hosted on Amazon Web Services, as such we follow Amazon Web Services best practices for data storage and access management.

  • Data is always encrypted during transit
  • We use only TLS 1.3 standard for browser connections
  • We routinely audit and upgrade our systems
  • Sensitive data is encrypted at rest
  • We use Advanced Encryption Standard (AES) algorithm in Galois / Counter Mode (GCM) for encryption (256-bit keys)
  • Passwords are hashed with PBKDF2 with SHA256 hash
  • We enforce minimum password length

Amazon Web Services is vigilant about your privacy and data security. Security at AWS starts with the core infrastructure. Custom-built for the cloud and designed to meet the most stringent security requirements in the world, AWS infrastructure is monitored 24x7 to ensure the confidentiality, integrity, and availability of our customer's data. The same world-class security experts who monitor this infrastructure also build and maintain our broad selection of innovative security services. As an AWS customer, Udio Systems inherit all the benefits of AWS experience, tested against the strictest of third-party assurance frameworks.

The AWS data centre security strategy is assembled with scalable security controls and multiple layers of defence that help to protect your information. For example, AWS carefully manages potential flood and seismic activity risks. AWS use physical barriers, security guards, threat detection technology, and an in-depth screening process to limit access to data centres. AWS back up data systems, regularly test equipment and processes, and continuously train AWS employees to be ready for the unexpected.

To validate the security of AWS data centres, external auditors perform testing on more than 2,600 standards and requirements throughout the year. Such independent examination helps ensure that security standards are consistently being met or exceeded. AS a result, the most highly regulated organisations in the world tryst AWS to protect their data. 

The AWS Cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. Amazon's scale allows significantly more investment in security policing and counter measures than almost any large company could afford on it's own. This infrastructure is comprised of the hardware, software, networking and facilities that run AWS services, which provide powerful controls to customers and APN Partners, including security configuration controls, for the handling of personal debt.