Stensul provides various tools and features that can be used to keep a Stensul account and resources safe from unauthorized use, including user/password authentication with a configurable password and account lockout policy, standard SSO methods: OAUTH2 / OIDC & SAML 2.0., and user activity logging for security monitoring. For more distributed use, SSO may be configured for JIT access, enabling secure and agile operations. You can view our SSO integrations here.
Data security – transmission and encryption
Customer and employee login information for the Stensul platform is encrypted using non-reversible encryption techniques, data is transmitted using only HTTPS endpoints with TLS (2048 bit keys). Data is encrypted both in transmission and at rest for working files and offsite backups.
Physical and operational security
The Stensul production environment is located at TIER-1 providers in the United States that offer robust physical and operational security. Stensul uses Google Cloud Platform (GCP) and Amazon Web Services (AWS) as production data centers.
Stensul uses a world-class infrastructure that is carefully monitored, dispersed around multiple availability zones, and has fault-tolerant web architectures with cloud resources.
Application development life-cycle
Stensul product development adheres to software development life-cycle (SDLC) best practices with multiple steps to ensure the quality and the security of our platform.