Security Architecture

Enterprise-Grade
Security Architecture

AWS infrastructure, encryption, access control, and compliance. Layered design based on dual ISMS-P + ISO 27001 certification.

Infrastructure Security

Hosted on AWS Seoul Region with multi-layered defense from network to server.

AWS Seoul Region
Domestic Data Sovereignty

All data stored and processed within Korea with no overseas transfers.

Seoul Region (ap-northeast-2)
Domestic storage & processing
No overseas transfer

VPC Network Isolation
External Access Blocked

Logical network separation per client. Subnets, security groups, and NACLs completely block external access.

Network Layer Defense
VPC
Isolation
SG
Sec Group
NACL
Block

WAF + Shield
Automated DDoS Protection

AWS WAF blocks OWASP-based web attacks while AWS Shield provides automated DDoS mitigation.

WAF
Web Attack Blocking
Shield
DDoS Defense

Direct Connect
Dedicated Line

Financial clients connect via Direct Connect dedicated lines, bypassing the public internet.

Public InternetExposure Risk
Direct ConnectDedicated Line

Data Security

Protecting data throughout its entire lifecycle — from storage to transit to disposal.

AES-256 Encryption
Data-at-Rest Protection

Database, file storage, and backups are all encrypted with AES-256.

Encryption Coverage
DatabaseAES-256
File StorageAES-256
BackupAES-256

TLS 1.3 Transit Encryption
MITM Prevention

Client-server communication encrypted with TLS 1.3. Lower versions are disabled.

Client
TLS 1.3 Encrypted
Server
MITM Attacks Fully Prevented

Automatic PII Masking
Full Access Logging

Sensitive data is automatically masked. Full audit logs capture who accessed what data and when.

Name K*H
Phone 010-****-5678
Log Retention Minimum 1 year

Data Disposal
Secure Deletion Procedure

Data is securely deleted at service termination. Permanently destroyed using irrecoverable methods.

Request
Received
Delete
Full Destruction
Confirm
Certificate Issued

Operational Security

People and process-level access controls to prevent even internal threats.

RBAC Role-Based
Granular Access Control

Least privilege principle applied per role: system admin, client admin, sub-admin, learner.

System Admin Full Access
Client Admin Training Mgmt
Learner Learn Only

SSO · SAML 2.0
Two-Factor Auth (2FA)

Integrates with enterprise authentication (AD, Okta, Azure AD). Admin accounts require additional OTP two-factor authentication.

SSO
Single Sign-On
SAML
2.0 Integration
OTP
2FA Auth

IP Whitelist
Admin Access Restriction

Admin pages accessible only from whitelisted IP ranges. Non-whitelisted IPs are automatically blocked.

10.0.1.0/24 Allowed
192.168.0.0/16 Allowed
Other IPs Block

Vulnerability Patching
Critical: Within 24 Hours

Critical vulnerabilities patched within 24 hours, High within 72 hours, Medium within 7 days.

Critical 24 Hours
High 72 Hours
Medium 7 Days

Compliance

Meeting industry regulatory requirements from mandatory training to financial and public sector regulations.

5 Mandatory Trainings
Auto-Managed In-Platform

Automatically manages workplace safety, harassment prevention, disability awareness, privacy protection, and anti-bullying training.

Workplace Anti-Bullying
Harassment Prevention
Privacy Protection
Anti-bullying +2 more

Financial Regulations
Vendor Audits · AML

Supports electronic financial supervision vendor security audits and provides legal evidence for financial consumer protection training completion.

Vendor Audit 99.1 Points
FCPA Proof Automated
AML Training Records Automated

Public Sector Compliance
Audit Trail for Inspections

Provides security audit trails for government inspections. Safety verified through ISMS-P certification.

Board of Audit
Audit Trail
Parliamentary Audit
Fully Prepared

Personal Data Processing
Safety Verification

Objectively demonstrates personal data processing safety through ISMS-P certification.

ISMS-P
3 domains · 102 controls 100% Compliance

Operational Reliability

Enterprise-level reliability and incident-response systems in operation.

Multi-AZ AWS Redundancy
Seoul Region multi-AZ architecture
15 min Recovery Target
Initial response and recovery
24/7 Real-time Monitoring
24/7 by dedicated operations team
5 Years Incident-Free Operation
Major insurer, consecutive years

Security Architecture — See it firsthand.
TouchClass protects your data.

Talk to sales