Cloud Sentrics Docs

Security & Compliance

How Cloud Sentrics protects your data and meets compliance requirements.

Security is built into every layer of Cloud Sentrics. Your data is protected by the same infrastructure that powers major financial institutions and government systems.

Data Encryption

  • At rest — All files and database records are encrypted using AES-256
  • In transit — All connections use TLS 1.2+ (HTTPS)
  • Keys — Managed by AWS Key Management Service (KMS)

Access Control

  • Multi-factor authentication (MFA) — Optional but recommended for all admin accounts
  • Role-based access — Users only see what they're authorized to access
  • Folder-level permissions — Restrict file access to specific users or groups
  • Session management — Automatic timeout after inactivity

Data Isolation

Each organization's data is completely isolated:

  • Separate storage buckets
  • Separate database tables
  • No cross-tenant data access possible
  • Dedicated authentication pool per organization

Audit Trail

Every action is logged:

  • File uploads, downloads, deletions
  • User logins and logouts
  • Admin actions (user creation, permission changes)
  • Data access events

Logs are retained and available in your Activity Log section.

Compliance

Cloud Sentrics helps you meet:

  • NDPR (Nigeria Data Protection Regulation) — data residency, consent, access controls
  • HIPAA considerations — audit trails, access controls, encryption (for healthcare)
  • ISO 27001 principles — information security management best practices

Infrastructure

Built on Amazon Web Services (AWS):

  • Data hosted in Africa (af-south-1) region
  • 99.9% uptime SLA
  • Automatic backups
  • Disaster recovery capabilities

Reporting a Security Concern

If you discover a security issue, contact us immediately at security@cloudsentrics.org or via WhatsApp: +234 814 457 3546.