We care a lot about security with BranchCMS. You entrust us with your website and we take the following measures with security.
Data Center Security, Availability, and Disaster Recovery
- BranchCMS leverages Amazon Web Services (AWS), a leading data center provider to house our physical infrastructure.
- AWS utilizes a variety of security equipment, techniques, and procedures designed to control, monitor, and record access to their facilities.
- Our infrastructure is designed to protect against and mitigate the effects of DDoS attacks.
- Remote access to the servers requires a secure VPN connection and two-factor authentication. We also limit administrative access to our environment to certain IP addresses.
- We follow the policy that all administrative users have limited access and they can only assume additional permissions with proper authorization through two-factor authentication.
- Strong passwords are required and regular password rotation is necessary.
Application Level Security
- BranchCMS hashes passwords for user accounts. No one, including us, can view the raw password.
- SSL certificates are provided for client websites.
- Web Application Firewall (WAF) technology is used to protect access to our systems.
- Customers are provided the ability to customize the user permissions to access their website administrations.
- Best practices are enforced during software development to prevent security vulnerabilities.
Backup and Restore
- Databases are backed up on a daily basis and kept for 21 days.
- Site files are stored in an S3 bucket where multiple redundancies are in place.
Redundancies & Scaling
- Multiple redundancies are in place for nearly all parts of the server environment.
Monitoring and Alerts
- Different automated monitoring tools are used to detect issues.
Patches and Updates
- AWS conducts centralized patch management on a regular basis for security-related updates. Regular patches are also done by our team to keep servers updated.
- All changes are tested in a staging environment before going into production.
See the AWS Security Whitepaper for more information about Amazon's role in security.