Everything we do at Mammoth is geared at every step with the philosophy of security first.
Data Security
Data sits in well-secured AWS Volumes
Encryption for storage at various levels (EBS, S3, EFS)
All the data exchange between the client and Mammoth is encrypted using Transport Layer Security (TLS ) protocol
Access Control
Identity and access management (IAM)
Multi-factor authentication
Mammoth has a robust permission model designed at its core to support data security
Each Instance is protected with stringent, minimal allow permissions at all Access levels
Access Control
Identity and access management (IAM);
Multi-factor authentication;
Mammoth has a robust permission model designed at its core to support data security;
Each Instance is protected with stringent, minimal allow permissions at all Access levels.
Infrastructure Security
Mammoth provides you with the benefits of a highly secure cloud architecture
The AWS infrastructure puts strong safeguards in place to help protect the privacy of data
Mammoth has a robust permission model designed at its core to support data security
Our deployment on Amazon web services (AWS) means you get all the benefits of world-class compliance programs on physical data center, network, and storage security
Integrity, Confidentiality, and Privacy
We have instituted robust security controls to ensure our compliance with SOC2, HIPAA, AND GDPR Standards
Our security controls are presently being audited for certification by an independent America Institute of Certified Professional Accountants (AICPA) auditing firm
Our SOC2 audit is based on AICPA Trust Services Principles and Criteria for Security, Availability, processing Integrity, Confidentiality, and Privacy