All Collections
FAQ
Defense Provisions
Defense Provisions

Virus attacks, unauthorized login, security level of passwords

Updated this week

Network Security: At Brahmin Solutions, we employ stringent security measures to regulate traffic to and from our EC2 instances. Our security groups are configured to:

  • Allow only HTTP and HTTPS ports world access, ensuring secure web traffic.

  • Restrict database port access to internal IPs and specific IPs used by our Development Team, bolstering internal security.

  • Enable port access to Development Team IPs on an as-needed basis, which is not default but enabled temporarily per specific requirements.

Port Management: Unnecessary ports are tightly controlled and remain closed unless explicitly approved by clients through formal written requests. This policy minimizes vulnerabilities and enhances our network's security posture.

Access Controls: Access to our servers and services is tightly regulated:

  • Only users possessing valid access keys and operating from Development Team IPs can log into specific servers or services.

  • We block any unauthorized access attempts at the firewall level if the origin IP is not recognized or listed in our firewall rules.

  • As an additional layer of security, access to AWS services requires a combination of a recognized IP, a valid access key, and the correct password.

Password Security Measures: Our application-level security includes:

  • Monitoring and blocking any account that exceeds three failed login attempts consecutively, to prevent brute force attacks. An email notification is sent to the registered email address, informing the user of the account lockout for security reasons.

  • Encrypting passwords prior to storing them in our database to protect sensitive information.

Best Practices for Data Security: To ensure the safety of your data, we recommend adhering to the following best practices:

  • Keep your login credentials confidential.

  • Create strong, complex passwords.

  • Regularly change your passwords, ideally every six months.

  • Always log out of your workstation when it is not in use to prevent unauthorized access.

Did this answer your question?