top of page

Security

Customers trust Infinity to protect their data. That trust requires a service that is highly available and secure. As an Infinity customer, you benefit from a service designed, built, maintained, and monitored to meet rigorous security, compliance, and privacy requirements.

Built For The Cloud

Infinity is offered as a fully managed cloud service - 100% born and built in the cloud. Currently, all of Infinity's services are run and hosted in Amazon Web Services (AWS), hence our security policies follow AWS best practices and leverage the underlying security policies of AWS. Infinity does not operate any physical hosting facilities or physical computer hardware of its own.

Security Features

Infinity offers enterprise-level security features designed to protect and secure customer data.

IP Allowlist

IP Allowlist restricts access to only a specified set of IP addresses, so only calls made to the Infinity service originating from a specified IP address will be accepted.

Role Based Access Control (RBAC)

Infinity enforces least privileged access through custom roles that can be scoped to the resource level and to specific actions, giving users only the level of access they need at that time.

Single Sign On

Infinity has integrations with SSO providers like Okta, OneLogin, JumpCloud and Microsoft Azure Active Directory to enforce strong user authentication to Infinity.

Multi-Factor Authentication

Infinity has native support for strong multi-factor authentication including TOTP.

Transformed Content

Transformed content and extracted semantic metadata is stored and queried via SQL in Infinity. The service provides you extra security by limiting the exposure of the underlying data to authorized users.

Data Masking

PII (personally identifiable information) or PHI (protected health information) fields can be transformed at ingest with a one-way crypto hash function so that Infinity only stores the hashed values and not the original PII/PHI fields.

Audit Logging

Infinity maintains comprehensive, searchable, and exportable audit logs of all security-related events including authentication, permissions changes, CRUD operations, assumptions of privileges, and more.

Data Encryption

Data Encryption in Flight

Data in flight from customers to Infinity and from Infinity back to customers is encrypted through TLS 1.2 certificates with HSTS and controlled by network policies. Certificates are created and managed by AWS Certificate Manager. An AWS application load balancer terminates TLS connections at our API endpoint. We secure internal communication using AWS VPC functionality.

Data Encryption at Rest

Data is encrypted at rest throughout all of Infinity's services using encryption keys that are managed by AWS Key Management Service (KMS) and are never exposed to anyone, including to Infinity service.

Vulnerability Management

Penetration Testing

Infinity employs a third party security firm to perform Security, Vulnerability, and Penetration testing across our platform. These are run at least annually and findings are remediated according to their criticality and prioritization.

Vulnerability Disclosure Program

Infinity is committed to working with industry experts and security researchers to ensure our products are the most secure they can be for our customers. Infinity partners with HackerOne in order to continuously improve our security posture.

Compliance & Privacy

soc2.png
SOC 2 Type II

Infinity certifies its systems annually to AICPA SOC 2 Type II, successfully auditing the operational and security processes of our service. Infinity's SOC 2 Type 2 report is available upon request.

ccpa.png
CCPA

The California Consumer Privacy Act (CCPA) creates consumer rights relating to the access to, deletion of, and sharing of personal information that is collected by businesses. Infinity is committed to supporting its customers in their CCPA compliance efforts.

gdpr.png
GDPR

The General Data Protection Regulation (GDPR) regulates the use and protection of personal data originating from the European Economic Area (EEA) and provides individuals rights with regard to their data. Infinity provides customers the necessary capabilities for building GDPR compliance.

© 2022 by Infinity

bottom of page