At Azumo we take Security of our customer data seriously.We work every day to ensure that our security is aligned with industry security standards.

Software Development Security Highlights

Servers and Networking

All servers that we deploy at Azumo are continuously patched. For additional hosted services that we utilize, such as Amazon S3, RDS, and Route 53, we take advantage of AWS's comprehensively hardened infrastructure-as-a-service (IaaS) platforms among other services.


Azumo stores data such as metadata, activity, original files, and customer’s data in different locations while also compiling and generating documents when requested. All data in each location is encrypted at rest with AES-256.

Software Development

Azumo follows industry standard programming techniques for development documentation and quality assurance processes. We also follow guidelines such as the OWASP report, to ensure that our customer applications meet security standards.

Customer Payments

When developing Payment systems, Azumo encourages it customers to use 3rd party secure payment process providers to facilitate transactions. Azumo does not store nor have access to any credit card, debit card, or bank account information of our customers or their end users.

Application Architecture

We encourage our customers to deploy their applications using containers on AWS, GCP, and other cloud service providers. Application isolation, and network communications protection, ensure security compliance across customer's infrastructure components and container deployments.

Service Level Agreement

Azumo's infrastructure relies on several layered techniques for increasing uptime and availability. Our approach includes the use of auto-scaling, load balancing, task queues, and rolling deployments. We conduct daily backups of our databases. All backups of our data are encrypted and we encourage our customers to employ the same practices.