Security & Compliance

Eliqua.CX is engineered on enterprise-grade security and compliance frameworks, built to exceed global standards for data protection and reliability. Powered by AWS and aligned with GDPR, it delivers bulletproof protection and full transparency, while ensuring uninterrupted business continuity.

Certifications, Standards & Cloud Compliance

GDPR Aligned Eliqua.CX complies fully with the EU General Data Protection Regulation (GDPR), ensuring lawful, transparent, and secure handling of all personal data. Key measures:
  • Privacy-by-design defaults with minimal data collection and restrictive permission presets
  • Encrypted, resilient backups with point-in-time recovery for uninterrupted continuity
  • Comprehensive API security framework with rate-limiting, strict validation, and dedicated API activity logs
  • Streamlined support for all Data Subject Rights and Secure development lifecycle (SDLC) integration
  • Continuously verified through regular penetration testing based on OWASP Top 10
These measures ensure that Eliqua.CX embeds privacy, accountability, and data protection into every operation. AWS Security and Cloud Compliance Eliqua.CX is deployed across multiple AWS Availability Zones, ensuring service continuity even in the event of local outages. The infrastructure inherits AWS’s enterprise-grade protections, including:
  • Multi-zone redundancy for high availability and operational resilience
  • Web Application Firewall (WAF) and network firewalls for continuous perimeter defense
  • Continuous monitoring and threat detection through AWS CloudWatch, GuardDuty,Inspector and CloudTrail
  • Built-in alignment with AWS Well-Architected security principles, including encryption, access control, and isolation best practices.
  • “Deployed on AWS” badge, verifying full hosting within AWS infrastructure and alignment with its operational and security standards.
  •  AWS Foundational Technical Review (FTR) approved, confirming compliance with the AWS Well-Architected Framework for performance, reliability, and security
All environments, production, UAT, and testing, are isolated across separate networks, protecting live systems from development activities. Periodic penetration tests and vulnerability scans ensure proactive detection and remediation of potential weaknesses before deployment.

Data Protection and Encryption​

Eliqua.CX ensures uncompromising data protection at every layer. Built on AWS, the platform encrypts all information at rest with AES-256 and in transit with TLS 1.2+, managed through AWS Key Management Service (KMS) for total lifecycle control and auditing.

All environments are access-controlled with Multi-Factor Authentication (MFA), role-based permissions, and least-privilege IAM policies

Encrypted backups, multi-zone redundancy, and point-in-time recovery guarantee resilience, while continuous vulnerability scanning and automated patching keep the system one step ahead of threats.”

Every byte is encrypted. Every access verified. Every process auditable.
With Eliqua.CX, data protection isn’t just compliance, it’s a competitive advantage.

Authentication Security

Eliqua.CX implements a secure authentication framework ensuring that every user and system connection is verified and protected.
The platform supports Single Sign-On (SSO) and Multi-Factor Authentication (MFA) for identity assurance.
Authentication is based on JSON Web Tokens (JWT), providing encrypted, short-lived access tokens for both users and API integrations.
All authentication events are logged for audit and traceability

Data Privacy and Compliance Controls

Eliqua.CX integrates privacy protection mechanisms directly into its data model and operational logic.

  • Data Minimization and Purpose Limitation
    Only essential information is collected and used exclusively for defined business purposes.
  • User Rights Enablement
    Built-in processes support user requests for data access, correction, export, or deletion in full compliance with GDPR Articles 15–20.
  • Anonymization and Retention Policies
    Configurable retention rules and anonymization workflows allow businesses to manage data lifecycle automatically, based on regional regulations.
  • Audit and Logging
    All system actions affecting personal data are recorded through immutable logs for compliance verification and forensic traceability.

Maintaining Compliance and Continuous Assurance

Eliqua.CX turns compliance into a continuous advantage. Independent audits, supplier assessments, and continuous compliance reviews ensure lasting resilience, while ongoing employee training keeps data protection at the heart of every operation.
Through structured change management and version-controlled Infrastructure as Code (IaC), every update remains transparent, tested, and fully auditable. Automated backup and point-in-time recovery mechanisms protect business continuity, while a defined Incident Response Plan ensures that any potential event, from detection to resolution, is handled swiftly, transparently, and with minimal impact
This proactive governance model allows Eliqua.CX to stay ahead of evolving regulations and cyber threats, maintaining uncompromising reliability and trust for every client, every day.