Methods of Security Enforcement
Engineered for maximum security with our Eventual Re-encryption techniques
Security is paramount at Lamba. We employ a multi-layered approach to ensure the highest level of data protection and privacy:
Data Encryption: All sensitive data stored and transmitted through Lamba is encrypted using advanced algorithms.
Regular Audits: Our systems undergo regular security audits to identify and rectify any vulnerabilities.
Compliance with Standards: Lamba adheres to industry-standard compliance protocols, ensuring your data is handled with the utmost care and security.
Robust Access Control: We implement strict access controls and authentication measures to safeguard against unauthorized access to sensitive data.
We Have More Security Measures in our Arsenal!
In addition to our multi-layered security approach, Lamba incorporates a unique and robust security architecture to ensure the utmost safety of your sensitive data:
I. Eventual Re-encryption Principle: At the core of our security architecture is the principle of Eventual Re-encryption. This innovative approach is designed to continuously enhance the security of your data over time. Here's how it works:
Continuous Encryption: Sensitive records on Lamba are encrypted at rest. This means your sensitive data is always stored in an encrypted state, safeguarding it against unauthorized access.
Quarterly Key Rotation: We perform key rotation every quarter. This process involves changing the encryption keys used to secure your data, significantly reducing the likelihood of any security breaches.
Strengthened Security Through Interaction: The unique aspect of Lamba's security comes into play with your usage. Each interaction with your encrypted data triggers re-encryption (which happens behind the scenes, and does not in any way affect you or your customers) with these newly rotated keys. This means the more you use Lamba, the more secure your data becomes.
99.99% Safety Assurance: Through this continuous process of re-encryption, your sensitive records are safe 99.99% of the time.
Invalidation of Old Keys: To ensure enduring security, all sensitive records are eventually re-encrypted with new encryption keys. The old keys are securely invalidated and permanently deleted after 2 years. This prevents any future or potential misuse of old keys.
User Engagement and Data Security: This system also means that the more your customers interact with your product, the more secure their data becomes on Lamba.
II. Origin-Based Access Restriction for API Keys: This feature adds an extra layer of security, ensuring that your API keys are not just protected, but their usage is tightly controlled. Here's how it enhances your security:
Customizable Access Control: Users can specify which origins (i.e., IP addresses) are permitted to access and use their API keys. This means API requests are only accepted from sources pre-approved by the user.
Prevention of Unauthorized Use: This restriction significantly reduces the risk of unauthorized use of API keys. Even if an API key is exposed, it becomes virtually useless outside of the specified origins.
Enhanced Data Security: By controlling which origins can use the API keys, users gain a higher level of data security, as the access to their data is strictly governed and monitored based on their preferences.
Flexibility and Control: Users have the flexibility to update and modify the access restrictions as per their changing needs, offering them complete control over who can interact with their data.
III. Two-Factor Authentication (2FA) for Enhanced Account Security: Lamba's commitment to security is further exemplified by the implementation of Two-Factor Authentication (2FA) for user logins. This critical feature plays a pivotal role in safeguarding user accounts, especially in scenarios where passwords may have been compromised. Here's how 2FA contributes to enhancing account security:
Layered Defense Against Unauthorized Access: 2FA adds an additional layer of security beyond the password. Even if a password is breached, the second factor of authentication serves as a robust barrier against unauthorized access.
Customizable 2FA Setup: Users can easily set up 2FA from their Lamba dashboard settings. This feature offers flexibility in choosing the preferred method of the second factor, such as using an authentication hardware or software system, or an email verification.
Increased User Control and Peace of Mind: With 2FA, users gain more control over their account's security. It significantly reduces the risk of unauthorized account access, giving users peace of mind.
Proactive Response to Security Threats: Implementing 2FA is a proactive approach to security, particularly vital in an era where password breaches are increasingly common.
Last updated
Was this helpful?