Your Security is Our Priority

Security Policy

1. Data Encryption

1.1 Transport Layer Security (TLS) and Advanced Encryption Standard (AES 256)
Strabo employs a combination of Transport Layer Security (TLS) and Advanced Encryption Standard (AES 256) to safeguard data. TLS is utilized in modern applications to protect information during transit, preventing unauthorized access by third parties. Data exchanged between Strabo API and data providers exclusively utilizes TLS for enhanced security.

1.2 Encryption at Rest
All sensitive data is encrypted at rest, adhering to secure data standards. Strabo ensures that data providers comply with these standards, guaranteeing the confidentiality and integrity of stored information.

2. Authentication

2.1 Multi-Factor Authentication (MFA) and Passwordless Platform
Strabo is a passwordless platform that implements Multi-Factor Authentication (MFA). No secure login information is requested or stored. Authentication involves secure codes sent directly to the user's email, enhancing security and preventing unauthorized access to data.

2.2 Authentication with Banking Providers
Authentication with banking providers is conducted using OAuth 2.0 and OpenID Connect for user authentication. This robust method ensures a high level of security and restriction. Strabo neither stores nor retains any sensitive information related to authentication, maintaining the integrity and confidentiality of user data.

3. Infrastructure

3.1 Cloud-Based System

Strabo operates as a cloud-based system, relying on cloud providers and technologies that invest significantly in data security. The selected providers undergo rigorous testing to ensure their security and robustness. Strabo stays current with modern cloud infrastructure and implements best practices, leveraging years of security improvements to protect against potential security incidents.

4. Monitoring

4.1 Robust Monitoring, Analytics, and Automated Alerts

Strabo employs a comprehensive monitoring system, integrating analytics and automated alerts. This approach ensures high visibility into the system's performance and facilitates swift reactions to potential incidents. The combination of monitoring tools enhances our ability to detect, analyze, and resolve issues promptly, contributing to a secure and resilient operational environment.
Get updates on Product, Team News, Community and Coverage
Sign up to our Newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.