Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact us
English (UK)
US English (US)
GB English (UK)
  • Home
  • Security & Privacy

Introduction to Security

Introduction to Security: Ensuring Robust Protection for Aphra Users

Written by Charlie Henderson

Updated at December 3rd, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Email Management
  • Subscription & Billing
  • Calendar & Event Management
  • Avatar & Assistant
  • Task Management
  • Security & Privacy
  • AI Messages
  • Reminders
  • General
+ More

Security is a cornerstone of Aphra, ensuring users can confidently engage with our platform. Here's an overview of our security practices and certifications:

1. CASA Assessment:
  - Aphra has undergone a comprehensive external Cloud Application Security Assessment (CASA), a rigorous evaluation built on industry-recognised standards.
  - CASA leverages the OWASP Application Security Verification Standard (ASVS), establishing consistent, stringent security benchmarks for applications.

2. Certification and Testing:
  - Aphra is certified at a Tier Two level, affirming robust protection measures.
  - Detailed testing of all application endpoints ensures fortified security, reducing vulnerabilities and mitigating potential attacks.

3. User Assurance:
  - Our commitment to security through CASA assessments underscores the integrity and safety of Aphra. Users can trust their interactions and data are protected by a high standard of security practices.

In choosing Aphra, you are assured of a platform thoroughly vetted and continuously enhanced to provide a secure experience. For further information on our security measures, or for support, please contact our team.

Category Status
Architecture, Design and Threat Modelling Requirements Pass
Authentication Verification Requirements Pass
Session Management Verification Requirements Pass
Access Control Verification Requirements Pass
Validation, Sanitization and Encoding Verification Requirements Pass
Stored Cryptography Verification Requirements Pass
Error Handling and Logging Verification Requirements Pass
Data Protection Verification Requirements Pass
Communications Verification Requirements Pass
Malicious Code Verification Requirements Pass
Business Logic Verification Requirements Pass
File and Resources Verification Requirements Pass
API and Web Service Verification Requirements Pass
Configuration Verification Requirements Pass

 

protection safety

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Introduction to Privacy
Discover Us on Social Media
tiktok
vector-2
image-20
vector-1
vector
Useful Links
  • About Us
  • Privacy Policy
  • T&Cs
  • Sitemap
  • Contact Us
Find Us Now
  • 128 City Road, London, EC1V 2NX
  • hello@aphra.me

©2024 Aphra is a registered trademark of Aphra Tech Ltd. All Rights Reserved.

Expand