How Mitto Keeps You Safe
Mitto Users Benefit from a Safer Online Experience
Security is a top priority at Mitto. That’s why we take a proactive, multi-layered approach to security. To learn about the security benefits we offer to our users, we invite you to take a tour of our security features.
-
- All passwords are encrypted with 1024 bit RSA or 256 bit AES algorithms
- The Mitto service is rigorously tested against XSS (Cross-site Scripting), XSRF (Cross-site Request Forgery), SQL Injection, Session Fixation & Hijacking
- All input is validated, and javascript inputs are validated twice (once before submit, and once by the server)
- Strong access control is applied at all levels
- Database servers allow no external network connections
- No executable content is loaded based on externally-supplied parameters
- All user data is handled uniformly in a manner to validate formatting and ensure against buffer-overruns
- Critical data is never written unencrypted to any sort of long-term storage, such as backup tapes and hard disks (including swap files)
- We take a minimalist approach to network services. Only services that are needed are enabled and allowed
- All network access must be authenticated, and no anonymous access is allowed
- All server operating system components and services are run in separate, secured environments. This way a potential breach of any one service or component is isolated.
- Source files are located on a read-only file system, so they cannot be overwritten by malicious code.
- A minimalist approach is applied to servers so that only software and services that are needed are installed and enabled.
- All services and servers are monitored and tested daily to assure that they are properly configured and that all security patches are applied immediately
- Authentication and access logs are monitored to identify unauthorized access attempts
- Intrusion detection tools are used to identify external intrusion attempts
Technical Security Information
For those of you who want some additional technical details, we've included some of that information below.
Application Security
Network Level Security
Server Level Security
Monitoring