Questions and Answers on Security

The following questions and answers provide a concise reference for the most frequently asked security and data-related inquiries from our customers. During procurement processes and security assessments, our cloud specialists are available to support detailed questionnaires and in-depth discussions.


Where does RD8 store data? 

All customer data is stored in Google servers in Belgium. All files are encrypted at rest using google managed keys using AES-256-GCM encryption algorithm. 


How often does RD8 take backups? 

Backups are taken every night.

 

Are RD8 prepared to restore from backups? 

Personnel is educated in restoring from backups and disaster recovery drills are conducted annually. 


How long are backups stored before deletion? 

Database backups are stored for 30 days. 

File backups are stored for 14 days. 


How can users authenticate? 

Users can authenticate with username and password or SSO (Single Sign On) via Auth0 for example by connecting it to your own Azure Active Directory. 


How do RD8 manage access to cloud infrastructure? 

Only authorized RD8 personnel are allowed access to cloud infrastructure with a principle of least privileges.  

Admin accounts and privileges are separated from day-to-day accounts. 

All accounts require two factor authentication. 

All changes are reviewed, version controlled and deployed via CI/CD pipelines. 


How do Rd8 secure data transfer over the public internet? 

All public API’s use HTTPS, only support TLS version 1.2 or higher and only allow ChaCha20 and AES-GCM encryption algorithms. 

 

How do RD8 manage application releases? 

Only authorized personnel are allowed to publish new application releases after it has been peer reviewed and through the quality assurance processes. 

All code releases are version controlled at tagged. 

All deployments are audit logged showing who released what, when and where. 


Do RD8 developers get proper security training? 

Yes, all developers are subjected to secure coding training bi-annually and required to follow our “Secure code review”-checklist when conducting peer reviews. 


Last updated March 10th. 2025 by Chief Cloud Operations Officer

 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article