Security

Product Security

Secure Customer Identity and Access Management (CIAM)

We are powered by AWS Cognito, an enterprise grade cloud solution which supports Identity and Access Management for customer accounts.  We ensures high availability with security powered by AWS to ensure our customers can trust their credentials are stored safely.

Network and Application Security

Data Hosting

Our physical infrastructure is hosted and managed within Amazon Web Services (AWS) using their secure data centers. Rynse leverages many of the platform’s built-in security, privacy, and redundancy features. AWS continually monitors its data centers for risk and undergoes assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under ISO-27001, SOC 1 and SOC 2/SSAE 16/ISAE 3402, PCI Level 1, FISMA Moderate, and Sarbanes-Oxley (SOX). Rynse utilizes the US-WEST-2 region currently.

Application Infrastructure

Rynse runs in a serverless architecture with our API powered by AWS API Gateway and an application running in AWS Lambda.  This is a superior architecture to physical or virtual static servers, it is not possible for attackers to port scan or discover hosts that are potentially vulnerable to attacks.  With security policies written in AWS IAM, all resources have controlled access within our integrated cloud environment.

Encryption

Rynse runs entirely in HTTPS to protect customer data in transit from our web application to the backend API.

Internal Permissions

Our employees have limited access to customer data and are restricted to only employees who require it for their job.  Rynse employees are authenticated on the same level as customers, all powered by AWS best practices and secure cloud infrastructure.

Incident Response

Rynse has established an internal protocol for handling security events which includes escalation procedures, rapid mitigation, and documented post mortem. All employees are formally informed and presented with related policies.

Penetration Testing and Vulnerability Scanning

We utilize third-party penetration testing and vulnerability scanning to ensure our application is secure, any findings of vulnerabilities are prioritized work to be fixed.  Since our application runs on managed AWS services, we have the advantage of having AWS as our operations team and trust their security.

Availability and Reliability

Uptime

Our application is built on a cloud platform that maintains higher than 99.9% uptime. Check our status anytime at https://rynse.statuspage.io/.

Failover and Business Continuity

With our IaC (Infrastructure as Code) application, we are able to launch our application in multiple AZs with a deployment, we have automated backups running hourly and with automated alarms to ensure response times are within our SLAs.

Security and Compliance Programs

SOCS2

Rynse has established and follows strict information security policies and controls which encompass the trust service categories related to security, availability, processing integrity, and confidentiality.

People


Training 

Rynse follows a least-permission approach to data access and handling. We retain only the minimum necessary customer data and restrict internal access to those who need it for their role. All employees are required to familiarize themselves with our security policies and receive training on proper data handling to maintain our strong commitment to protecting your privacy and ensuring the security of your data.

Background Checks

Character references and background checks are completed for every hire at Rynse.


Confidentiality

All employees sign a confidentiality agreement before they start at Rynse.