Security is at Our Core

Layered Protection, Continuous Monitoring and AWS-Powered Resilience

Want to learn more?

Security in Every ISI Deployment

Security is built into every layer of the ISI platform. From infrastructure and application design to daily operational practices, your data, customers, and brand are protected. With AWS-backed architecture and proven safeguards, insurers can grow confidently without adding complexity.

Identity and Access Protection

Control who gets in and what they can access.

  • Single Sign-On (SSO) through Microsoft Entra ID and other identity providers
  • Role-Based Access Control (RBAC) to ensure access rights reflect user responsibilities
  • Multi-factor authentication available for heightened protection

Comprehensive Data Protection

Your data remains encrypted and fully within your control.

  • Encryption in transit using HTTPS/TLS protocol
  • Encryption at rest across databases, file systems, and backups with AWS-managed keys
  • Data residency options to meet regulatory and operational requirements
  • Separation of production, staging, and testing environments to prevent data exposure

Infrastructure-Level Security

Reduce exposure and maintain full visibility across your environment.

  • Only HTTPS (port 443) is accessible externally
  • WS network segmentation to isolate systems and control traffic
  • Continuous monitoring for threats and anomalous activity
  • Logged infrastructure changes to support audit and compliance readiness

Secure, Scalable Growth with AWS

Enterprise-grade security that grows with your business.

  • High availability with redundancy across AWS availability zones
  • Elastic scalability to support peak workloads without disruption or downtime
  • Global access with low latency for internal teams, policyholders, and partners
  • Compliance supported by AWS certifications such as SOC 1/2/3, ISO 27001, GDPR, and PCI DSS
  • No need for hardware or large capital investments

FAQs

  1. How does ISI protect data within the platform?

    ISI uses encryption in transit and at rest, AWS-managed keys, segregated environments, and secure transport protocols. Data remains fully within the insurer’s control and is protected at all stages of processing.

  2. What identity and access controls does the system support?

    The platform supports Single Sign-On, role-based access control, and optional multi-factor authentication. Access rights are configurable to match user responsibilities and organizational security policies.

  3. How does ISI secure its cloud infrastructure?

    ISI deployments follow AWS best practices including network segmentation, restricted ports, continuous monitoring, logged infrastructure changes, and automated threat detection to maintain security and compliance.

  4. What compliance standards does ISI support?

    ISI aligns with AWS-supported certifications such as SOC 1, SOC 2, SOC 3, ISO 27001, PCI DSS, GDPR, and other regional requirements. Audit trails and logged events support regulatory reviews and insurer governance needs.