Security and Compliance
Revvity Signals Software ensures cloud security with a multilayered approach to protect customer data.
READ THE SECURITY AND COMPLIANCE WHITEPAPER
In the face of cyberattacks and emerging threats, Revvity Signals protects customer data with a combination of the most trusted tools, policies, and the IT industry’s best practices. The overall security strategy utilizes a “defense in depth” much like a fortified castle, as it employs numerous layers of protection to block unauthorized access. This approach ensures that even in the unlikely event that a threat actor breaches one layer of defense, they will encounter additional barriers that protect valuable customer data.
Revvity Signals surpasses basic regulatory and industry compliance requirements by seeking third-party verification.
A voluntary compliance standard that specifies how organizations should manage customer data. Developed by the American Institute of CPAs (AICPA), we adhere and attest to the following trust services principles: security, availability, and confidentiality.
The leading international standard focused on information security. It was developed for companies to protect their information systematically and enterprise-wide by adopting an information security management system.
Hardening Standard, a third-party standard. The Center of Internet Security (CIS) Hardening Standard are internationally recognized security standards for defending cloud systems and data against cyberattacks. These security standards are identified and patched according to each separate and supported operating system.
AWS platform services that support the Advanced Encryption Standard (AES) with 256-bit keys or AES256-bit encryption.
Revvity Signals adopts a Zero Trust security model, which mandates the authentication of all users involved in data transactions. This includes:
Revvity Signals deploys an array of industry-trusted solutions for another layer of protection.
Virtual machines are diligently protected through patching, IP restriction, and whitelisting, ensuring that only authorized users have access. The platform administrator handles account creation and role-based access.
Hosts are secured with weekly Vulnerability Scanning to identify security weaknesses and flaws in systems and the third-party software running on them. Vulnerability scanning protects the organization from security breaches and the exposure of Sensitive Data. There are three types of vulnerability scans done weekly: Host, Web application, and network Perimeter scans.
Revvity Signals adheres to the industry’s gold standards for cyber security policies and procedures, including threat management workflows and incident response plans. Collaboration with third-party forensic experts enhances SecOps’ ability to respond to attacks.