Security safeguards
Encryption, access control, logging, breach detection.
What the law requires
Implement reasonable security safeguards — encryption at rest and in transit, access controls, audit logging and monitoring. Under DPDP Rules 2025 these are now prescriptive technical requirements: encryption/masking, tokenisation, access controls, audit logging and backup are explicitly listed. Organisations must be able to evidence these controls to the Data Protection Board.
How Cyfriq addresses this
- AES-256 encryption at rest — separate encryption key per tenant stored in AWS KMS
- TLS 1.3 encryption in transit — all data including agent-to-cloud communication
- Role-based access control (RBAC) — users access only data relevant to their role
- Immutable WORM audit log — every access, action and event recorded and tamper-proof
- UEBA engine continuously monitors for anomalous access patterns and insider threats
- MFA enforced on every login — TOTP, push, FIDO2 / YubiKey
- Device trust — only registered healthy devices with valid certificates can access