Security
At Magic Feedback, we prioritize the protection of customer data at all times. Our policies are based on the following foundational principles.
1
Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.
2
Security controls should be implemented and layered according to the principle of defense-in-depth.
3
Security controls should be applied consistently across all areas of the enterprise.
4
The implementation of controls should be iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.
Data protection
Data at rest
All datastores with customer data are encrypted at rest. Sensitive collections and tables also use row-level encryption.
This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.
Data in transit
Magic Feedback uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit.