Security & Compliance
Eliqua.CX is engineered on enterprise-grade security and compliance frameworks, built to exceed global standards for data protection and reliability. Powered by AWS and aligned with GDPR, it delivers bulletproof protection and full transparency, while ensuring uninterrupted business continuity.
Certifications, Standards & Cloud Compliance
- Privacy-by-design defaults with minimal data collection and restrictive permission presets
- Encrypted, resilient backups with point-in-time recovery for uninterrupted continuity
- Comprehensive API security framework with rate-limiting, strict validation, and dedicated API activity logs
- Streamlined support for all Data Subject Rights and Secure development lifecycle (SDLC) integration
- Continuously verified through regular penetration testing based on OWASP Top 10
- Multi-zone redundancy for high availability and operational resilience
- Web Application Firewall (WAF) and network firewalls for continuous perimeter defense
- Continuous monitoring and threat detection through AWS CloudWatch, GuardDuty,Inspector and CloudTrail
- Built-in alignment with AWS Well-Architected security principles, including encryption, access control, and isolation best practices.
- “Deployed on AWS” badge, verifying full hosting within AWS infrastructure and alignment with its operational and security standards.
- AWS Foundational Technical Review (FTR) approved, confirming compliance with the AWS Well-Architected Framework for performance, reliability, and security
Data Protection and Encryption
Eliqua.CX ensures uncompromising data protection at every layer. Built on AWS, the platform encrypts all information at rest with AES-256 and in transit with TLS 1.2+, managed through AWS Key Management Service (KMS) for total lifecycle control and auditing.
All environments are access-controlled with Multi-Factor Authentication (MFA), role-based permissions, and least-privilege IAM policies.
Encrypted backups, multi-zone redundancy, and point-in-time recovery guarantee resilience, while continuous vulnerability scanning and automated patching keep the system one step ahead of threats.”
Every byte is encrypted. Every access verified. Every process auditable.
With Eliqua.CX, data protection isn’t just compliance, it’s a competitive advantage.
Authentication Security
Eliqua.CX implements a secure authentication framework ensuring that every user and system connection is verified and protected.
The platform supports Single Sign-On (SSO) and Multi-Factor Authentication (MFA) for identity assurance.
Authentication is based on JSON Web Tokens (JWT), providing encrypted, short-lived access tokens for both users and API integrations.
All authentication events are logged for audit and traceability
Data Privacy and Compliance Controls
Eliqua.CX integrates privacy protection mechanisms directly into its data model and operational logic.
- Data Minimization and Purpose Limitation
Only essential information is collected and used exclusively for defined business purposes. - User Rights Enablement
Built-in processes support user requests for data access, correction, export, or deletion in full compliance with GDPR Articles 15–20. - Anonymization and Retention Policies
Configurable retention rules and anonymization workflows allow businesses to manage data lifecycle automatically, based on regional regulations. - Audit and Logging
All system actions affecting personal data are recorded through immutable logs for compliance verification and forensic traceability.
Maintaining Compliance and Continuous Assurance
Eliqua.CX turns compliance into a continuous advantage. Independent audits, supplier assessments, and continuous compliance reviews ensure lasting resilience, while ongoing employee training keeps data protection at the heart of every operation.
Through structured change management and version-controlled Infrastructure as Code (IaC), every update remains transparent, tested, and fully auditable. Automated backup and point-in-time recovery mechanisms protect business continuity, while a defined Incident Response Plan ensures that any potential event, from detection to resolution, is handled swiftly, transparently, and with minimal impact
This proactive governance model allows Eliqua.CX to stay ahead of evolving regulations and cyber threats, maintaining uncompromising reliability and trust for every client, every day.