Data Security and Compliance

Everything we do at Mammoth is geared at every step with the philosophy of security first.

Data Security

  • Data sits in well-secured AWS Volumes
  • Encryption for storage at various levels (EBS, S3, EFS)
  • All the data exchange between the client and Mammoth is encrypted using Transport Layer Security (TLS ) protocol

Access Control

  • Identity and access management (IAM)
  • Multi-factor authentication
  • Mammoth has a robust permission model designed at its core to support data security
  • Each Instance is protected with stringent, minimal allow permissions at all Access levels

Infrastructure Security

  • Mammoth provides you with the benefits of a highly secure cloud architecture
  • The AWS infrastructure puts strong safeguards in place to help protect the privacy of data
  • Mammoth has a robust permission model designed at its core to support data security
  • Our deployment on Amazon web services (AWS) means you get all the benefits of world-class compliance programs on physical data center, network, and storage security

Integrity, Confidentiality, and Privacy

  • We have instituted robust security controls to ensure our compliance with SOC2, HIPAA, AND GDPR Standards
  • Our security controls are presently being audited for certification by an independent America Institute of Certified Professional Accountants (AICPA) auditing firm
  • Our SOC2 audit is based on AICPA Trust Services Principles and Criteria for Security, Availability, processing Integrity, Confidentiality, and Privacy