What are the security and access control measures for Hilti’s data centers, and how to access related information

  • Updated

Hilti’s data centers are managed by Amazon Web Services (AWS), which implements robust security and access control measures:

General Security Policies: AWS offers comprehensive security policies for building and access management. You can view these guidelines online: AWS Data Center Controls.

Physical Security Guidelines: AWS ensures the physical security of its data centers and publishes this information for transparency: AWS Data Center Security.

Customer Access to Security Guidelines: Yes, you can access the AWS secure data center design documentation via er/"AWS Compliance Resources.

Uniform Security Standards: All AWS data centers used by Hilti adhere to the same high standards of physical security and infrastructure.

Responsibility for Access Rights: AWS is responsible for granting access rights to its data centers. Details can be found here: AWS Access Control.

Verification of Access Control: AWS ensures verification of access control through published controls: AWS Data Center Controls.

Physical Access Security: Physical access to AWS data centers is secured using advanced measures. Details are available at AWS Access Security.

Authentication Tools: AWS employs access cards, biometric systems, and other tools for secure authentication. AWS Authentication Methods.

Access Logging: All access attempts are logged and monitored by AWS: AWS Access Logging.

Two-Factor Authentication: AWS utilizes two-factor authentication techniques for data center access: AWS Two-Factor Authentication.

Adherence to Guidelines: AWS ensures adherence to access guidelines through stringent controls: AWS Compliance Controls.

Surveillance Systems: AWS data centers use advanced surveillance systems, including video surveillance, motion sensors, and security staff: AWS Surveillance.

Customer Access to Incident Records: AWS manages access to video surveillance and access control records: h_ls"AWS Incident Management.

For more insights into AWS’s security practices, visit AWS Compliance.

Related to

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request