Leysha utilizes the best in class cloud infrastructure from Amazon Web Services (AWS) which delivers a scalable cloud computing platform with high availability and dependability, providing the tools that enables us to securely run Leysha 24×7 without any downtimes. It Helps to protect the confidentiality, integrity, and availability of our customers’ data which is of the utmost importance to us alongside maintaining customer trust and confidence.
Secure Network Architecture
Network devices, including firewall and other boundary devices, are in place to monitor and control communications at the external boundary of the network and at key internal boundaries within the network. These boundary devices employ rule sets, access control lists (ACL), and configurations to
enforce the flow of information to specific information system services. ACLs, or traffic flow policies, are established on each managed interface, which manage and enforce the flow of traffic. ACL policies are approved by Amazon Information Security. These policies are automatically pushed using AWS’s