All information that we receive and transmit is fully encrypted. We are committed to using the most advanced encryption techniques to ensure that you are as protected as possible.
We employ significant controls to ensure your data remains secure. PBXDOM actively employs a policy of least provisioning where employees are only granted the minimum system access to perform their assigned job function. PBXDOM employees cannot decrypt encrypted account data.
All communication to/from PBXDom to your side is completely encrypted and can not be accessed by any middle man.
PBXDOM stores its data in AWS . All of the data centers have achieved ISO/IEC 27001:2005 certification, PCI DSS Level 1 compliance, and SAS70 Type II compliance. Learn more about AWS.
AWS operates the global cloud infrastructure that you use to provision a variety of basic computing resources such as
processing and storage. The AWS global infrastructure includes the facilities, network, hardware, and operational
software (e.g., host OS, virtualization software, etc.) that support the provisioning and use of these resources. The AWS
global infrastructure is designed and managed according to security best practices as well as a variety of security
compliance standards. As an AWS customer, you can be assured that you’re building web architectures on top of some
of the most secure computing infrastructure in the world.
Amazon Web Services Compliance enables customers to understand the robust controls in place at AWS to maintain
security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance
responsibilities will be shared. By tying together governance-focused, audit-friendly service features with applicable
compliance or audit standards, AWS Compliance enablers build on traditional programs; helping customers to establish
and operate in an AWS security control environment. The IT infrastructure that AWS provides to its customers is
designed and managed in alignment with security best practices and a variety of IT security standards, including:
SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70)
FISMA, DIACAP, and FedRAMP
DOD CSM Levels 1-5
PCI DSS Level 1
ISO 9001 / ISO 27001
MTCS Level 3
In addition, the flexibility and control that the AWS platform provides allows customers to deploy solutions that meet
several industry-specific standards, including:
Criminal Justice Information Services (CJIS)
Cloud Security Alliance (CSA)
Family Educational Rights and Privacy Act (FERPA)
Health Insurance Portability and Accountability Act (HIPAA)
Motion Picture Association of America (MPAA)
AWS provides a wide range of information regarding its IT control environment to customers through white papers,
reports, certifications, accreditations, and other third-party attestations. More information is available in the Risk and
Compliance whitepaper available on the website: http://aws.amazon.com/compliance/.
AWS’s data centers are state of the art, utilizing innovative architectural and engineering approaches. Amazon has many
years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied
to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities. Physical access is strictly
controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance,
intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a
minimum of two times to access data center floors. All visitors and contractors are required to present identification and
are signed in and continually escorted by authorized staff.
AWS only provides data center access and information to employees and contractors who have a legitimate business
need for such privileges. When an employee no longer has a business need for these privileges, his or her access is
immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical access
to data centers by AWS employees is logged and audited routinely.
Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes
smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms
and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or
gaseous sprinkler systems.
The data center electrical power systems are designed to be fully redundant and maintainable without impact to
operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in
the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide
back-up power for the entire facility.
Climate control is required to maintain a constant operating temperature for servers and other hardware, which
prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain
atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at
AWS monitors electrical, mechanical, and life support systems and equipment so that any issues are immediately
identified. Preventative maintenance is performed to maintain the continued operability of equipment.
When a storage device has reached the end of its useful life, AWS procedures include a decommissioning process that is
designed to prevent customer data from being exposed to unauthorized individuals. AWS uses the techniques detailed
in DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media
Sanitization”) to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are
degaussed and physically destroyed in accordance with industry-standard practices.
The AWS network has been architected to permit you to select the level of security and resiliency appropriate for your
workload. To enable you to build geographically dispersed, fault-tolerant web architectures with cloud resources, AWS
has implemented a world-class network infrastructure that is carefully monitored and managed.
Network devices, including firewall and other boundary devices, are in place to monitor and control communications at
the external boundary of the network and at key internal boundaries within the network. These boundary devices
employ rule sets, access control lists (ACL), and configurations to enforce the flow of information to specific information
ACLs, or traffic flow policies, are established on each managed interface, which manage and enforce the flow of traffic.
ACL policies are approved by Amazon Information Security. These policies are automatically pushed using AWS’s ACLManage
tool, to help ensure these managed interfaces enforce the most up-to-date ACLs.
AWS has strategically placed a limited number of access points to the cloud to allow for a more comprehensive
monitoring of inbound and outbound communications and network traffic. These customer access points are called API
endpoints, and they allow secure HTTP access (HTTPS), which allows you to establish a secure communication session
with your storage or compute instances within AWS. To support customers with FIPS cryptographic requirements, the
SSL-terminating load balancers in AWS GovCloud (US) are FIPS 140-2-compliant.
In addition, AWS has implemented network devices that are dedicated to managing interfacing communications with
Internet service providers (ISPs). AWS employs a redundant connection to more than one communication service at
each Internet-facing edge of the AWS network. These connections each have dedicated network devices.
You can connect to an AWS access point via HTTP or HTTPS using Secure Sockets Layer (SSL), a cryptographic protocol
that is designed to protect against eavesdropping, tampering, and message forgery.
For customers who require additional layers of network security, AWS offers the Amazon Virtual Private Cloud (VPC),
which provides a private subnet within the AWS cloud, and the ability to use an IPsec Virtual Private Network (VPN)
device to provide an encrypted tunnel between the Amazon VPC and your data center.
Logically, the AWS Production network is segregated from the Amazon Corporate network by means of a complex set of
network security / segregation devices. AWS developers and administrators on the corporate network who need to
access AWS cloud components in order to maintain them must explicitly request access through the AWS ticketing
system. All requests are reviewed and approved by the applicable service owner.
Approved AWS personnel then connect to the AWS network through a bastion host that restricts access to network
devices and other cloud components, logging all activity for security review. Access to bastion hosts require SSH publickey
authentication for all user accounts on the host. For more information on AWS developer and administrator logical
access, see AWS Access below.
Amazon’s infrastructure has a high level of availability and provides you with the capability to deploy a resilient IT
architecture. AWS has designed its systems to tolerate system or hardware failures with minimal customer impact.
Data centers are built in clusters in various global regions. All data centers are online and serving customers; no data
center is “cold.” In case of failure, automated processes move customer data traffic away from the affected area. Core
applications are deployed in an N+1 configuration, so that in the event of a data center failure, there is sufficient
capacity to enable traffic to be load-balanced to the remaining sites.
AWS provides you with the flexibility to place instances and store data within multiple geographic regions as well as
across multiple availability zones within each region. Each availability zone is designed as an independent failure zone.
This means that availability zones are physically separated within a typical metropolitan region and are located in lower
risk flood plains (specific flood zone categorization varies by region). In addition to utilizing discrete uninterruptable
power supply (UPS) and onsite backup generators, they are each fed via different grids from independent utilities to
further reduce single points of failure. Availability zones are all redundantly connected to multiple tier-1 transit
You should architect your AWS usage to take advantage of multiple regions and availability zones. Distributing
applications across multiple availability zones provides the ability to remain resilient in the face of most failure
scenarios, including natural disasters or system failures. However, you should be aware of location-dependent privacy
and compliance requirements, such as the EU Data Privacy Directive. Data is not replicated between regions unless
proactively done so by the customer, thus allowing customers with these types of data placement and privacy
requirements the ability to establish compliant environments. It should be noted that all communications between
regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect
As of this writing, there are eleven regions: US East (Northern Virginia), US West (Oregon), US West (Northern
California), AWS GovCloud (US), EU (Ireland), EU (Frankfurt), Asia Pacific (Singapore), Asia Pacific (Tokyo), Asia Pacific
(Sydney), South America (Sao Paulo), and China (Beijing).
AWS GovCloud (US) is an isolated AWS Region designed to allow US government agencies and customers to move
workloads into the cloud by helping them meet certain regulatory and compliance requirements. The AWS GovCloud
(US) framework allows US government agencies and their contractors to comply with U.S. International Traffic in Arms
Regulations (ITAR) regulations as well as the Federal Risk and Authorization Management Program (FedRAMP)
requirements. AWS GovCloud (US) has received an Agency Authorization to Operate (ATO) from the US Department of
Health and Human Services (HHS) utilizing a FedRAMP accredited Third Party Assessment Organization (3PAO) for
several AWS services.
The AWS GovCloud (US) Region provides the same fault-tolerant design as other regions, with two Availability Zones. In
addition, the AWS GovCloud (US) region is a mandatory AWS Virtual Private Cloud (VPC) service by default to create an
isolated portion of the AWS cloud and launch Amazon EC2 instances that have private (RFC 1918) addresses. More
information about GovCloud is available on the AWS website: http://aws.amazon.com/govcloud-us/
AWS utilizes a wide variety of automated monitoring systems to provide a high level of service performance and
availability. AWS monitoring tools are designed to detect unusual or unauthorized activities and conditions at ingress
and egress communication points. These tools monitor server and network usage, port scanning activities, application
usage, and unauthorized intrusion attempts. The tools have the ability to set custom performance metrics thresholds for
Systems within AWS are extensively instrumented to monitor key operational metrics. Alarms are configured to
automatically notify operations and management personnel when early warning thresholds are crossed on key
operational metrics. An on-call schedule is used so personnel are always available to respond to operational issues. This
includes a pager system so alarms are quickly and reliably communicated to operations personnel.
Documentation is maintained to aid and inform operations personnel in handling incidents or issues. If the resolution of
an issue requires collaboration, a conferencing system is used which supports communication and logging capabilities.
Trained call leaders facilitate communication and progress during the handling of operational issues that require
collaboration. Post-mortems are convened after any significant operational issue, regardless of external impact, and
Cause of Error (COE) documents are drafted so the root cause is captured and preventative actions are taken in the
future. Implementation of the preventative measures is tracked during weekly operations meetings.
AWS security monitoring tools help identify several types of denial of service (DoS) attacks, including distributed,
flooding, and software/logic attacks. When DoS attacks are identified, the AWS incident response process is initiated. In
addition to the DoS prevention tools, redundant telecommunication providers at each region as well as additional
capacity protect against the possibility of DoS attacks.
The AWS network provides significant protection against traditional network security issues, and you can implement
further protection. The following are a few examples:
Distributed Denial Of Service (DDoS) Attacks. AWS API endpoints are hosted on large, Internet-scale, worldclass
infrastructure that benefits from the same engineering expertise that has built Amazon into the world’s
largest online retailer. Proprietary DDoS mitigation techniques are used. Additionally, AWS’s networks are multihomed
across a number of providers to achieve Internet access diversity.
Man in the Middle (MITM) Attacks. All of the AWS APIs are available via SSL-protected endpoints which
provide server authentication. Amazon EC2 AMIs automatically generate new SSH host certificates on first boot
and log them to the instance’s console. You can then use the secure APIs to call the console and access the host
certificates before logging into the instance for the first time. We encourage you to use SSL for all of your
interactions with AWS.
IP Spoofing. Amazon EC2 instances cannot send spoofed network traffic. The AWS-controlled, host-based
firewall infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its
Port Scanning. Unauthorized port scans by Amazon EC2 customers are a violation of the AWS Acceptable Use
Policy. Violations of the AWS Acceptable Use Policy are taken seriously, and every reported violation is
investigated. Customers can report suspected abuse via the contacts available on our website at:
When unauthorized port scanning is detected by AWS, it is
stopped and blocked. Port scans of Amazon EC2 instances are generally ineffective because, by default, all
inbound ports on Amazon EC2 instances are closed and are only opened by you. Your strict management of
security groups can further mitigate the threat of port scans. If you configure the security group to allow traffic
from any source to a specific port, then that specific port will be vulnerable to a port scan. In these cases, you
must use appropriate security measures to protect listening services that may be essential to their application
from being discovered by an unauthorized port scan. For example, a web server must clearly have port 80
(HTTP) open to the world, and the administrator of this server is responsible for the security of the HTTP server
software, such as Apache. You may request permission to conduct vulnerability scans as required to meet your
specific compliance requirements. These scans must be limited to your own instances and must not violate the
AWS Acceptable Use Policy. Advanced approval for these types of scans can be initiated by submitting a request
via the website at: https://aws-portal.amazon.com/gp/aws/html-formscontroller/contactus/AWSSecurityPenTestRequest
Packet sniffing by other tenants. It is not possible for a virtual instance running in promiscuous mode to receive
or “sniff” traffic that is intended for a different virtual instance. While you can place your interfaces into
promiscuous mode, the hypervisor will not deliver any traffic to them that is not addressed to them. Even two
virtual instances that are owned by the same customer located on the same physical host cannot listen to each
other’s traffic. Attacks such as ARP cache poisoning do not work within Amazon EC2 and Amazon VPC. While
Amazon EC2 does provide ample protection against one customer inadvertently or maliciously attempting to
view another’s data, as a standard practice you should encrypt sensitive traffic.
In addition to monitoring, regular vulnerability scans are performed on the host operating system, web application, and
databases in the AWS environment using a variety of tools. Also, AWS Security teams subscribe to newsfeeds for
applicable vendor flaws and proactively monitor vendors’ websites and other relevant outlets for new patches. AWS
customers also have the ability to report issues to AWS via the AWS Vulnerability Reporting website at: