Data Encryption
Here you can find information about the encryption of your data at rest and in motion, including answers to frequently asked questions.
Encryption of Data at Rest
Auto Insights leverages best-in-class cloud services with the option to exploit native data encryption services for the protection of client data. By default, all client data at rest (while it is stored on disks) is secured using (AES256) encryption.
Encryption of Data in Motion
Auto Insights employs industry-grade encryption (TLS 1.2 and TLS 1.3) for all web/HTTPS traffic.
Console access to Auto Insights services is limited to key operational staff and is protected through the use of SSH. SSH sessions are protected via identity-based certificates rather than passwords.
Frequently Asked Questions
Secure Deletion
Do you support secure deletion (for example, degaussing/cryptographic wiping) of archived and backed-up data as determined by the tenant?
For information on Auto Insights' retention policy, see Data Retention and Purging. Secure deletion at the hardware level is handled by the cloud platform provider.
Unique Encryption Keys
Are you able to generate unique encryption keys per customer/tenant?
No. Data is encrypted using default generated keys managed by Google.
Key Management Procedures
Do you maintain key management procedures, such as documenting ownership for each stage of the lifecycle of encryption keys?
No, the lifecycle is managed by Google.
Encryption at Rest
Is tenant data encrypted at rest (on disk/storage) within your environment?
Yes, all data is encrypted at rest using default generated keys managed by Google.
Infrastructure Compliance and Monitoring
Do you have the capacity to continuously monitor and report the compliance of your infrastructure against your information security baselines?
Yes.