Security

Security combined with scale.

Introduction to Application Security:

Application security is a critical aspect of software development, involving the protection of user data and ensuring the integrity of the application. At Binary Tech Operations, we follow industry best practices to provide a solid security foundation, using proven methodologies.

Shared Responsibility in Security:

We operate on a "Platform as a Service" (PaaS) architecture, working closely with Amazon Web Services (AWS). This means there is a shared responsibility between Binary Tech Operations, AWS, and you, as a platform user, to maintain security.

Security Measures Implemented:

  • Account Security: Includes user authentication and encryption of data at rest and in transit.

  • Application-Level Safeguards: We adopt strict application security measures, such as DDoS protection, penetration testing, and backups.

  • Compliance with Security Standards: We comply with the SOC 2 Type II standard and follow applicable data privacy laws, such as the GDPR.

AWS Physical and Operational Security:

AWS manages the physical infrastructure, hardware, network, and server environment integrity, applying multiple layers of operational and physical security.

Application Security: Your Responsibilities:

As a user of Binary Tech Operations, you are responsible for:

  • Understanding and following our guidelines and policies.

  • Maintaining secure access to your account.

  • Properly using Binary Tech Operations' settings and tools.

  • Reporting security issues in a timely manner.

Key Areas of Focus in Application Security:

  • Protection Against Data Leaks: This is done by configuring appropriate privacy rules for all types of private data.

  • Application Code Security: Although Binary Tech Operations is a no-code platform, the final application files (HTML, CSS, JSON, JavaScript) are downloaded to the user's device. It is essential not to place sensitive data, such as API keys, in these areas.

  • Unauthorized Account Access: Ensure a secure signup and login process, considering the implementation of a password policy and two-factor authentication.

Implementation of Privacy Rules:

  • Privacy rules are conditions configured for each data type to protect them from being viewed and edited by unauthorized users.

  • They are essential to keep private data secure and should be managed carefully to allow users to trust your application with their data.

Last updated