Udio's cloud-based software is hosted on Amazon Web Services (AWS). Udio follows all AWS’ best practices for data storage and access management to ensure a high level of security including, but not limited to:
- Data encryption during transit
- TLD 1.3 standard for browser connections
- Encrypt sensitive data at rest
- Routinely audit and upgrade all systems
- Hash passwords with PBKDF2 and SHA256
- Enforce minimum password lengths
- Encrypt with the Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM)
Udio and AWS are vigilant about your privacy and data. Security starts at the core infrastructure, custom-built for the cloud and designed to meet the most stringent security requirements in the world. AWS infrastructure is monitored 24/7 to ensure the confidentiality, integrity, and availability of your information. The same world-class security experts who monitor this infrastructure also build and maintain our broad selection of innovative security services. As an AWS customer, Udio inherits all the benefits of AWS experience, tested against the strictest of third-party assurance frameworks.
The AWS data centre security strategy is assembled with scalable security controls and multiple layers of defence that help to protect your information. For example, AWS carefully manages potential flood and seismic activity risks. AWS uses physical barriers, security guards, threat detection technology and an in-depth screening process to limit access to data centres. Data systems are backed up, equipment and processes regularly tested and employees continuously trained to be ready for the unexpected.
To validate the security of AWS data centres, external auditors perform testing on more than 2,600 standards and requirements throughout the year. Such independent examination helps ensure that security standards are consistently being met or exceeded. As a result, the most highly regulated organisations in the world trust AWS to protect their data, as do Udio.
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today.