Background Check Security Around the Clock
HireSafe uses a background check platform called Instascreen™ that is supported by Amazon Web Service (AWS). This protects your background check information against external attacks while stopping unauthorized access to protect against worms, trojans and other malicious data from entering and taking down your network. In addition, to put your security measures at ease our network is fully monitored by the experts at AWS 24/7.
AWS Security Benefits
The AWS cloud infrastructure has been built to be one of the most flexible and secure cloud computing environments available today. It provides a reliable and scalable platform. This enables us to deploy your applications quickly and securely.
Designed for Security
The AWS cloud infrastructure is housed in data centers designed to satisfy the requirements of our most security-sensitive customers. The AWS infrastructure has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation. When deploying systems in the AWS Cloud, it helps by sharing the security responsibilities with our clients. AWS manages the underlying infrastructure while our clients can secure anything that they deploy within AWS.
The Amazon Web Service infrastructure is protected by extensive network and security monitoring systems.. In addition, AWS infrastructure components are continuously scanned and tested. The AWS production network is segregated from the Amazon corporate network, and access to this network is monitored and reviewed on a daily basis by AWS security managers.The AWS production network is segregated from the Amazon corporate network and requires a separate set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by AWS security managers.
AWS purpose-builds most of our security tools to tailor them for AWS’s unique environment and scale requirements. These security tools are built to provide maximum protection for your data and applications. This means AWS security experts spend less time on routine tasks, and are able to focus more on proactive measures that can increase the security of your AWS Cloud environment.
AWS builds its data centers in multiple geographic regions as well as across multiple Availability Zones within each region to offer maximum resiliency against system outages. AWS designs its data centers with significant excess bandwidth connections so that if a major disruption occurs there is sufficient capacity to enable traffic to be load-balanced to the remaining sites, minimizing the impact on you.
Each certification means that an auditor has verified that specific security controls are in place and operating as intended. You can view the applicable compliance reports by contacting your AWS account representative. For more information about the security regulations and standards with which AWS complies, see the AWS Compliance webpage.To help you meet specific government, industry, and company security standards and regulations, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, including: ISO 27001, SOC, the PCI Data Security Standard, FedRAMP, the Australian Signals Directorate (ASD) Information Security Manual, and the Singapore Multi-Tier Cloud Security Standard (MTCS SS 584). For more information about the security regulations and standards with which AWS complies, see the AWS Compliance webpage.
For a detailed list of all the security measures built into the AWS cloud infrastructure, platforms, and services, please read our AWS_Security_Whitepaper.
The Amazon Web Service continually scans for anomalous, inappropriate, and unauthorized access attempts at the edge of your network providing a safe and secure interface for HireSafe clients.