Data Encryption and Protection
Data Encryption and Protection
CertiNext implements a comprehensive data encryption and protection model to safeguard sensitive information across its entire lifecycle—at rest, in transit, and during processing. The design aligns with enterprise security expectations and regulatory requirements, ensuring confidentiality, integrity, and controlled access to customer data in both SaaS and on-premises deployments.
Encryption of Data at Rest
All sensitive data stored by CertiNext is encrypted at rest at the database layer. This includes, but is not limited to:
Personally identifiable information (PII)
Certificate metadata and lifecycle records
Audit logs and operational data
Configuration data associated with certificate management
Encryption at rest ensures that data remains protected even in the unlikely event of unauthorized access to storage systems.
Where supported, CertiNext uses strong, industry-standard encryption algorithms consistent with modern security best practices.
Customer Key Control (BYOK)
In deployment models where Bring Your Own Key (BYOK) is enabled:
Customer data is encrypted using customer-provided encryption keys
Customers retain control over key ownership and lifecycle
Encryption keys are logically isolated per customer
This model provides additional assurance for organizations with strict data sovereignty, regulatory, or internal security requirements.
Encryption of Data in Transit
All data transmitted between:
Users and the CertiNext UI
APIs and automation clients
Bots and the CertiNext platform
Integrated systems and services
is protected using TLS 1.2 or higher.
This ensures confidentiality and integrity of data during transmission and protects against interception, tampering, or downgrade attacks.
Key Management and Protection
Cryptographic keys used for encryption are:
Generated and stored securely
Access-controlled based on least-privilege principles
Protected using hardened key management practices
In SaaS deployments, keys are managed using FIPS 140-2 Level 3 compliant HSMs operated within secure data centers. In on-prem deployments, key management aligns with the customer’s chosen HSM or key management infrastructure.
Application-Level Data Protection
CertiNext’s application architecture further strengthens data protection by:
Avoiding persistence of customer data at the application layer
Ensuring all sensitive data is stored only in the secured data layer
Enforcing strict access controls before any data is retrieved or modified
This minimizes the attack surface and simplifies recovery and audit processes.
Access Controls and Segregation
Encryption is complemented by strong access controls:
Role-based access control (RBAC) within the application
Least-privilege access for platform and operational users
Logical tenant isolation in SaaS deployments
Optional database-level isolation per customer
Only authorized users and services can access decrypted data, and all access is logged for audit purposes.
Monitoring, Auditing, and Compliance
CertiNext continuously monitors data access and usage patterns and maintains:
Detailed audit logs for all data-related operations
Alerts for abnormal or unauthorized access attempts
Evidence to support security audits and compliance reviews
These controls support alignment with frameworks such as ISO 27001, SOC 2, and other enterprise security requirements.
Summary
Data encryption and protection in CertiNext are implemented as foundational security controls, not optional features. By combining encryption at rest, encryption in transit, strong key management, access governance, and continuous monitoring, CertiNext ensures that customer data remains protected throughout its lifecycle—across deployments, environments, and operational scenarios.
Last updated
