Our top priority is your trust and safety
As a payments infrastructure company, our security posture continually evolves to meet the rigorous standards of the global financial industry.
Our infrastructure
is highly secure
is highly secure
Physical infrastructure security
Yuno's infrastructure is hosted in AWS data centers, and places reliance on AWS's audited security programs for the efficacy of physical, environmental, and infrastructure security controls.
Data in transit
All data at Yuno is processed under the TLS (Transport Layer Security) protocol version v1.2, which helps us guarantee the security of the Yuno website, making it resistant to attacks that exploit weaker versions of TLS.
Data at rest
At Yuno we use Advanced Encryption Standard (AES) with 256-bit keys when encrypting sensitive data within the vault. Each confidential record within the vault is previously encrypted under the SHA-512 hashing algorithm where irreversible and unique hashes are generated. It is then encrypted using a separate, randomly generated encryption key.
Security is key
to our product
to our product
Software development life cycle
Yuno uses a continuous and secure build and release process informed by industry practices including OWASP. New features and enhancements are peer reviewed and analyzed for security issues prior to release. Yuno also has a dedicated QA team that analyzes all code for issues prior to deployment into production.
Penetration testing and bug bounties
Yuno is committed to working with industry experts and security researchers to ensure our products are the most secure they can be for our customers. Yuno has an external firm conducting penetration tests for our product and we also partner with HackerOne’s bug bounty program in order to continuously improve our security posture.
Vulnerability and patch management
Patch management occurs within the context of Yuno's change management process. Externally- and internally-facing services are patched on a need-to-update basis. Any issues that are discovered are triaged and resolved according to their severity within the Yuno environment.
Our personnel is
trained and response-ready
trained and response-ready
Security trainings and awareness
At Yuno we carry out security and privacy awareness training for our technical and non-technical roles. This includes training on phishing awareness campaigns.
Formal security policies
Yuno has security policies that are kept up-to-date to meet the changing security environment.
Incident response plan
Yuno has a dedicated incident response team and plan that will coordinate with legal, product, and support teams to detect and respond to information security.