Encryption and Access Controls

Summary

AGIX Linux follows best practices to protect customer and potential customer information. This page details how we do this.

Encryption at Rest

AGIX Linux servers hosting customer and potential customer information have full-disk encryption in accordance with “https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-cryptography”.

Encryption in Transit

AGIX Linux servers hosting customer and potential customer information transmit data using transport encryption in accordance with “https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-cryptography”. AGIX Linux email servers support cryptography, but there is no guarantee that other servers do too. In which case security of email cannot be guaranteed.

Access Controls – Customer Portal

2FA and MFA are authentication mechanisms employed to protect customer and potential customer portal access. Each master account (the original account created) has the ability to create and manage sub-accounts for individuals to use to access the Customer Portal.

Access Controls – AGIX Linux Staff

AGIX Linux staff use system administration tools that enforce strong cryptography in accordance with “https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-administration/secure-administration”.

Further

If you require clarification on any of the above matters, please reach out to our sales team at sales@agixlinux.com and we will endeavour to answer your questions.