Security Overview

google-cloud-platform-logo

Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search, Gmail and YouTube. GCP also provides a series of modular cloud services including computing, data storage, data analytics and machine learning.

Why RealAML is hosted on the Google Cloud Platform (GCP)

Infrastructure

GCP’s cloud infrastructure doesn’t rely on any single technology to make it secure. Their stack builds security through progressive layers that deliver true defence in depth. Communications over the Internet to their public cloud services are encrypted in transit. Their network and infrastructure have multiple layers of protection to defend customers against Denial-of-service attacks. Data stored on GCP’s infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorised access and service interruptions. 

Compliance

GCP regularly undergo independent verification of their security, privacy, and compliance controls, achieving certifications, attestations of compliance, or audit reports against standards around the world. GCP also created resource documents and mappings against frameworks and laws where formal certifications or attestations may not be required or applied. These include ISO/IEC 27001, HIPAA, FedRAMP & SOC 1.

Privacy

Your data is critical to your business, and you take great care to keep it safe and under your control. We want you to feel confident that taking advantage of the Google Cloud Platform doesn’t require you to compromise on security or control of your business’s data. GCP provides notification if they detect a breach of security that compromises your data. You own your data. GCP does not process your data for advertising purposes. GCP reject government requests that are invalid, and publish a transparency report for government requests.

Cloudflare secures and ensures the reliability of RealAML’s web application. It protects our internal resources such as behind-the-firewall applications, teams, and devices. 

RealAML uses Cloudflare for:

Security

Firewall, DDoS protection, rate limiting, bot management, VPN, and more.

Performance

Intelligent routing, mobile & image optimisation, video, and cache.

Reliability

Load balancing, DNS, and virtual backbone.

RealAML also uses Transfer Layer Security (TLS) for:

Creating a secure digital tunnel that blocks hackers and thieves from seeing usernames,
passwords, credit card numbers, and other valuable data.

How does TLS work?

First, the TLS agreement

When a visitor accesses RealAML, our TLS certificate automatically creates a secure, encrypted connection with your browser. TLS is deployed on all RealAML pages and subdomains.

The padlock icon appears

Once the connection is complete, a padlock icon and https prefix appear in the browser bar to show you that our website is safe and secure.

Now you're in safe hands

All information passing to and from your website is now encrypted, making your sensitive data virtually unhackable.