Your data is yours, not ours. We never share your data with third parties unless you ask us to.
Overview
RedZone is a cloud-based natural disaster monitoring and hazard assessment platform designed to simplify the process of creating customized data collection apps for conducting field surveys. As a cloud solution, the RedZone platform runs on the Amazon Web Services (AWS) infrastructure, including Elastic Compute Cloud (EC2), Simple Storage Service (S3), and Virtual Private Cloud (VPC). By harnessing the AWS infrastructure, RedZone offers higher-availability, redundant high-capacity storage, and added reliability over self-hosted software solutions.
YOUR DATA IS SECURELY TRANSFERRED AND STORED.
All network communications within the RedZone platform are secured with 256-bit SSL (TLS 1.2) connections to keep your data safe through every step of the process.
SECURE DEVELOPMENT
Our application development process is designed to allow us to address security vulnerabilities, based on severity, as part of our standard release cycle.
NETWORK SECURITY
Within AWS, RedZone's instances are segmented into separate networks to provide additional controls over data flows within the system. All instances, including those not accessible to the public, are hardened and managed with automated configuration management.
ACCESS CONTROL
We implement a least privilege approach to ensure that only administrative staff have access to the RedZone database in accordance with the RedZone Terms of Service. Access to the RedZone AWS infrastructure is managed by our corporate single-sign-on (SSO) solution, which requires multiple factors to grant access.
PERSONNEL
All RedZone staff undergo a background check and sign a confidentiality and non-disclosure agreement. Aside from our use of AWS, we do not outsource any aspect of RedZone development, operation, or administration.
REDUNDANCY AND BACKUP
For disaster recovery, a cold standby is maintained in a separate availability zone and kept in sync via streaming replication. We run nightly full backups of the RedZone database, which are retained for 30 days.
DEPLOYED ON AWS
ENDPOINT SECURITY
All company-owned machines are managed via mobile device management (MDM).
AUTHENTICATION
All user accounts in RedZone require strong passwords for authentication to the system. In addition to the built-in RedZone authentication system, enterprise users may be able to link to their own identity providers using SAML 2.0.
MONITORING AND LOGGING
We use modern tools to monitor the RedZone infrastructure for suspicious activity. Alerts are automatically routed in our corporate communications for review and remediation. RedZone provides several layers of logging, which can be analyzed via automated or manual means.
VALIDATION
We perform annual penetration tests, using industry-standard practices. Findings are reviewed with RedZone technical staff and added to the RedZone roadmap for adjudication, based on severity. Active customers are also welcome to perform their own tests against the public-facing components of RedZone.