All Collections
FAQ
Encryption and Password Management
What are Elium’s key management procedures?
What are Elium’s key management procedures?
Updated over a week ago

Our policies require unique keys be used for each use case, and that keys not be reused for unrelated purposes. Keys for encryption of customer data at rest are managed by our cloud platform's providers. We use public/private keys to secure access to code repositories. Keys used by staff are generated by Elium employees on an individual basis and stored on local machines (full-disk encryption is enforced).

Did this answer your question?