Data Security

Sutherland Robility offers customers a comprehensive suite of security features to ensure data security. These features are designed to provide robust protection and can be automatically enabled or configured based on specific requirements. However, it is important to note that the effective utilization of these security controls relies on the organization's personnel who utilize the service.

Authorization of users and access control is managed by the customer's administrators. They are responsible for implementing controls to ensure that only authorized personnel have access to the system. The authorized data owner can define access restrictions, allowing access only to individuals with a legitimate business need. Fine-grained permissions are granted to corporate users through role-based access controls (RBAC) implemented from the Control Room. This allows for granular control over various aspects of the product, including credentials, bots, Robility Runner, Robility Designer, and SmartManager. RBAC models also enable the implementation of dual-controls and separation of duties within operations.

To ensure transparency and accountability, Robility provides comprehensive audit capabilities. All user actions within the platform are audited, providing a record of access and actions taken by operations personnel. This audit functionality is designed to align with industry best practices and helps organizations demonstrate compliance.

As bots are developed by customer business experts, Sutherland Robility follows secure software development life cycle (SDLC) processes. These processes include industry-standard practices for secure development, testing, and production environments. Sutherland Robility supports the separation of these environments through separate deployments and RBAC controls, ensuring the integrity and security of the automation workflows.

By offering robust security features, comprehensive audit capabilities, and adherence to secure SDLC practices, Sutherland Robility provides customers with a secure environment to leverage the benefits of the automation platform.

Encryption

To ensure the security and protection of customer data, Sutherland Robility leverages industry-standard encryption technologies throughout its service. Here are the key encryption measures implemented:

Encryption of Data in Transit: All communication between the customer's network and the Robility service is encrypted using HTTPS (Hypertext Transfer Protocol Secure) along with SSL (Secure Sockets Layer) or TLS (Transport Layer Security) 1.2. This encryption protocol ensures that data transmitted over the network is securely encrypted, preventing unauthorized access or interception.

Encryption of Data at Rest: Any data stored at rest is encrypted using AES-256 (Advanced Encryption Standard with a 256-bit key). AES-256 is widely recognized as a strong encryption algorithm that provides a high level of security for stored data. This encryption ensures that even if the physical storage media were to be compromised, the encrypted data would remain unreadable without the decryption key.

By utilizing HTTPS with SSL/TLS for data transmission and AES-256 encryption for data at rest, Sutherland Robility ensures that customer data is protected both during transit and while stored within the service. These encryption measures align with industry standards and best practices, providing a secure environment for the handling and storage of sensitive information.