Data Security and Compliance

Everything we do at Mammoth is geared at every step with the philosophy of security first.

Data Security

  • Data sits in well-secured AWS Volumes
  • Encryption for storage at various levels (EBS, S3, EFS)
  • All the data exchange between the client and Mammoth is encrypted using Transport Layer Security (TLS ) protocol

Access Control

  • Identity and access management (IAM)
  • Multi-factor authentication
  • Mammoth has a robust permission model designed at its core to support data security
  • Each Instance is protected with stringent, minimal allow permissions at all Access levels

Infrastructure Security

  • Mammoth provides you with the benefits of a highly secure cloud architecture
  • The AWS infrastructure puts strong safeguards in place to help protect the privacy of data
  • Mammoth has a robust permission model designed at its core to support data security
  • Our deployment on Amazon web services (AWS) means you get all the benefits of world-class compliance programs on physical data center, network, and storage security

Integrity, Confidentiality, and Privacy

  • We have instituted robust security controls to ensure our compliance with SOC2, HIPAA, AND GDPR Standards
  • Our security controls are presently being audited for certification by an independent America Institute of Certified Professional Accountants (AICPA) auditing firm
  • Our SOC2 audit is based on AICPA Trust Services Principles and Criteria for Security, Availability, processing Integrity, Confidentiality, and Privacy

Curious how to unlock your data and help your team make faster decisions?

Sign up for a product tour and your FREE consultation with our data management expert.