1. What kind encryption is available on Amorphic Data?
By default, ‘Encryption at Rest’ and ‘Encryption in Motion’ is enabled in the platform. Amorphic Data uses AWS Key Management Store to enable encryption at rest.
2. What are the access control mechanisms for Amorphic Data users?
Amorphic data provides ‘Role Based Access Control’ mechanism for the users. You can define access controls at various levels to achieve fine grained control over the data.
Security controls available at:
- Data Set Level
- Domain Level
- User Level
- Group Level
3. Can I restrict Amorphic Data access to a set of ‘IP’ addresses?
Yes. You can provide a list of IP addresses to be whitelisted at the time of Amorphic Data deployment.
4. Is Amorphic Data uses a multi-tenant environment?
No. Amorphic data will be installed to a dedicated AWS account for each customer.
5. What is the ‘Password’ strength for Amorphic Data?
Passwords must be at least 8 characters but fewer than 99 characters, Require numbers, Require a special character from this set:^ $ * . [ ] { } ( ) ? - ! @ # % & / \ , > < ‘ : ; | _ ~ ` Require uppercase letters, Require lowercase letters.
6. Can I change the role of user in Amorphic Data?
Yes. Administrators can change the role a user in Amorphic Data.
7. Can I remove a user from ‘Amorphic Data’?
Yes. Administrators can remove users from ‘Amorphic Data’.
8. Is Amorphic Data running on a web server?
No, Amorphic Data is a ‘Single Page Application’ deployed as a serverless model hosted in ‘Simple Storage Service (S3)’ on your dedicated SAAS AWS account.
9. How can I see my current usage and billing estimate?
Administrators can view the current usage under Administration->usage.