Search here...
< All Topics

Security, Compliance, and SLA


Sixth Force’s cloud products have all the necessary security compliance to guarantee that they pass your organization’s security audits.

Independent Auditors continually check the cloud offerings for compliance, security, and privacy;

Compliance programs

AWS Cloud is compliant with the following:

  1. CSA – Cloud Security Alliance Controls
  2. ISO 9001 – Global Quality Standard
  3. ISO 27001 – Security Management Controls
  4. ISO 27017 – Cloud Specific Controls
  5. ISO 27018 – Personal Data Protection
  6. PCI DSS Level 1 – Payment Card Standards
  7. SOC 1 – Audit Controls Report
  8. SOC 2 – Security, Availability, & Confidentiality Report
  9. SOC 3 – General Controls Report
  10. General Data Protection Regulation. Learn more here.

Learn more about compliance programs here.


AWS Application Server

AWS will use commercially reasonable efforts to make the Included Services each available for each AWS region with a Monthly Uptime Percentage of at least 99.99%.

AWS Database Server

We use single-AZ instances by default which are not covered by AWS SLA.

But Multi-AZ database servers can be availed on demand to get them covered under the SLA.

AWS will use commercially reasonable efforts to make Multi-AZ instances available with a Monthly Uptime Percentage of at least 99.95% during any monthly billing cycle.

Cloud Solution Provider

Our SLA can be found in this End-User Licenses Agreement.

Security Measures

Following are the default measures taken by us:

  1. Data-at-rest encryption
  2. Data-at-transit encryption
  3. 100% Compliance to AWS Foundational Security Best Practices
  4. 100% Compliance to CIS AWS Foundations Benchmark

There are additional Security features are available as part of the Security-optimized option

Site-to-site VPN

AWS Site-to-Site VPN creates encrypted tunnels between your network and your Amazon Virtual Private Clouds or AWS Transit Gateways.

With AWS Site-to-Site VPN, you can connect to an Amazon VPC or AWS Transit Gateway the same way you connect to your on-premises servers.

What are the pre-requisites to setup S2S VPN?

  1. Network Firewall IP (Public IP).
  2. Network Firewall CIDR block.
  3. Vendor, Platform, Software details to download the Site-to-Site VPN configuration file.

Web Application Firewall

AWS Web Application Firewall service lets you filter web traffic with custom rules. Rules are a set of conditions with predefined access control list actions (Block/Allow/Count). Every web request must match all the conditions in the Rule for AWS WAF to allow or block requests. It can block malicious requests and can also monitor and tune your web applications.

How load balancers provide security?

AWS Load Balancer is very secure because it works with Amazon Virtual Private Cloud and provides many robust security features, including integrated certificate management, user-authentication, and SSL/TLS decryption.

Using Amazon Virtual Private Cloud (Amazon VPC), we can to create and manage security groups associated with load balancers to provide additional networking and security options.

AWS Foundational Security Best Practices

AWS Foundational Security Best Practices is a security standard that implements security controls to detect when the AWS accounts and deployed resources do not align with the security best practices defined by AWS security experts.

By enabling this standard, we monitor our security posture to ensure that we are using AWS security best practices. These controls closely align to the Top 10 Security Best Practices outlined by AWS Chief Information Security Office, Stephen Schmidt, at AWS re:Invent 2019.

CIS AWS Foundations Benchmark

The CIS Security Benchmarks program provides well-defined, unbiased, consensus-based industry best practices to help organizations assess and improve their security.

The CIS AWS Foundations Benchmark is used for evaluating an organization’s security posture.

Security Audit Report of Prolaborate

Please email Support[at]prolaborate[dot]com to request the security report.


Start Here
Book a Demo