Security & Compliance
How Cloud Sentrics protects your data and meets compliance requirements.
Security is built into every layer of Cloud Sentrics. Your data is protected by the same infrastructure that powers major financial institutions and government systems.
Data Encryption
- At rest — All files and database records are encrypted using AES-256
- In transit — All connections use TLS 1.2+ (HTTPS)
- Keys — Managed by AWS Key Management Service (KMS)
Access Control
- Multi-factor authentication (MFA) — Optional but recommended for all admin accounts
- Role-based access — Users only see what they're authorized to access
- Folder-level permissions — Restrict file access to specific users or groups
- Session management — Automatic timeout after inactivity
Data Isolation
Each organization's data is completely isolated:
- Separate storage buckets
- Separate database tables
- No cross-tenant data access possible
- Dedicated authentication pool per organization
Audit Trail
Every action is logged:
- File uploads, downloads, deletions
- User logins and logouts
- Admin actions (user creation, permission changes)
- Data access events
Logs are retained and available in your Activity Log section.
Compliance
Cloud Sentrics helps you meet:
- NDPR (Nigeria Data Protection Regulation) — data residency, consent, access controls
- HIPAA considerations — audit trails, access controls, encryption (for healthcare)
- ISO 27001 principles — information security management best practices
Infrastructure
Built on Amazon Web Services (AWS):
- Data hosted in Africa (af-south-1) region
- 99.9% uptime SLA
- Automatic backups
- Disaster recovery capabilities
Reporting a Security Concern
If you discover a security issue, contact us immediately at security@cloudsentrics.org or via WhatsApp: +234 814 457 3546.