Security
How SendAuth protects your data and infrastructure
Security
We don’t just talk about security — we implement it.
SendAuth is engineered with layered security controls that meet the highest enterprise standards. Your authentication data is protected at every layer, from infrastructure to application.
Infrastructure Security
AWS Cloud Hosting
SendAuth runs entirely on Amazon Web Services, leveraging AWS’s world-class security infrastructure:
- ISO 27001, SOC 2, and FedRAMP certified data centers
- Physically isolated, redundant infrastructure
- 24/7 monitoring and automated threat detection
- Geographic redundancy for disaster recovery
Encryption at Rest
All data is encrypted at rest using AWS-managed encryption services:
- Amazon S3 with AES-256 server-side encryption (SSE-S3)
- Amazon RDS with AES-256 encryption for database storage
- AWS Key Management Service (KMS) for key lifecycle management
Encryption in Transit
Every connection to SendAuth is secured:
- All public connections require at least TLS 1.2 and prefer TLS 1.3.
- HTTPS enforced on all endpoints — no exceptions
- Perfect forward secrecy (PFS) enabled
- Automatic certificate management and renewal
Authentication & Access Control
Multi-Factor Authentication
MFA is mandatory for all users — always enforced, never optional:
- Required for all account access
- Required for all administrative operations
- No fallback to single-factor authentication
- Support for TOTP authenticators and hardware security keys
Sensitive Data Handling
User authentication credentials receive the highest level of protection:
- Passwords and sensitive authentication data are hashed only — never encrypted or stored in reversible form
- Industry-standard hashing algorithms with proper salting
- Authentication secrets are never logged or exposed in application data
Application Security
Content Security Policy
Strict CSP headers protect against cross-site scripting and injection attacks:
- Restrictive default policies blocking inline scripts
- Explicit allowlisting of trusted sources only
- Frame ancestors restricted to prevent clickjacking
- Report-URI configured for CSP violation monitoring
Software Updates
Security patches are applied aggressively:
- Critical vulnerabilities patched within 7 days of disclosure
- Automated dependency scanning and alerts
- Container images rebuilt with latest security updates
- No end-of-life software in production
Security Testing & Compliance
Penetration Testing
We validate our security controls through independent testing:
- Annual penetration testing by qualified third-party assessors
- Remediation reviews to verify fixes
- Scope includes infrastructure, application, and API layers
- Findings tracked to resolution
Continuous Monitoring
Security is monitored continuously, not just tested annually:
- Real-time alerting on suspicious activity
- Centralized logging with tamper-evident storage
- Automated vulnerability scanning
- Incident response procedures tested and maintained
Your Data, Protected
SendAuth is built from the ground up with security as a core requirement — not an afterthought. Every architectural decision prioritizes the protection of your authentication data and your users’ privacy.
Questions about our security practices? Contact us.