Encryption
Details about Bila’s encryption technologies and implementations
Encryption
Bila employs industry-leading encryption technologies to protect your data and transactions. This guide provides detailed information about our encryption implementations, key management practices, and how we secure data throughout its lifecycle.
Encryption Overview
Bila Encryption Architecture
Our encryption strategy follows these core principles:
- Defense in Depth: Multiple layers of encryption for comprehensive protection
- Industry Standards: Using proven, standardized encryption algorithms
- Key Rotation: Regular rotation of encryption keys
- Secure Key Management: Hardware-based key storage and strict access controls
- Zero Trust: Encrypting data even within our secure network boundaries
Data Encryption in Transit
All data transmitted to and from Bila systems is encrypted using secure protocols:
TLS Implementation
Bila requires TLS 1.2 or higher for all API connections and web traffic.
Our TLS configuration includes:
- Minimum TLS Version: TLS 1.2 required, TLS 1.3 preferred
- Strong Cipher Suites: Only high-security cipher suites are enabled
- Perfect Forward Secrecy: Ensuring past communications remain secure
- Certificate Management: Regular rotation and monitoring of TLS certificates
- HSTS: HTTP Strict Transport Security enforcement
API Encryption
All API requests and responses are encrypted using TLS:
Bila will reject any API connections that attempt to use insecure protocols or weak cipher suites.
Data Encryption at Rest
All sensitive data stored in our systems is encrypted:
Database Encryption
- Algorithm: AES-256-GCM for database field-level encryption
- Key Management: Database encryption keys are managed in a hardware security module (HSM)
- Implementation: Transparent data encryption at the database level plus application-level encryption for sensitive fields
File Storage Encryption
- Algorithm: AES-256 for all file encryption
- Key Management: Unique encryption keys for each file, with master keys stored in HSMs
- Implementation: Server-side encryption with strict access controls
Backup Encryption
- Algorithm: AES-256 for all backup data
- Key Management: Separate encryption keys for backups, with secure key rotation
- Implementation: All backups are encrypted before being stored
Tokenization
For highly sensitive data like payment card information, we use tokenization:
Tokenization Process
How Tokenization Works
- Sensitive data is received over an encrypted connection
- The data is immediately tokenized, generating a non-sensitive token
- The original data is encrypted and stored in a secure vault
- Only the token is stored in regular databases and logs
- The token can be used for future operations without exposing the original data
Tokenization vs. Encryption
Tokenization
- Replaces sensitive data with a random token
- No mathematical relationship to original data
- Cannot be reversed without access to the token vault
- Used for card numbers, bank accounts, etc.
Encryption
- Transforms data using a mathematical algorithm
- Can be reversed with the correct key
- Strength depends on algorithm and key management
- Used for general data protection
Key Management
Secure key management is critical to our encryption strategy:
Key Hierarchy
We implement a hierarchical key management system:
Root Keys
Master keys stored in FIPS 140-2 Level 3 HSMs
Key Encryption Keys (KEKs)
Used to encrypt data encryption keys
Data Encryption Keys (DEKs)
Used to encrypt actual data
Session Keys
Temporary keys used for specific operations
Key Rotation
We regularly rotate encryption keys to limit the impact of potential compromises:
- Root Keys: Rotated annually
- KEKs: Rotated quarterly
- DEKs: Rotated monthly
- Session Keys: New for each session
Access Controls
Access to encryption keys is strictly controlled:
- Separation of Duties: No single employee has access to all components
- Multi-Party Authorization: Critical key operations require multiple approvers
- Audit Logging: All key access and operations are logged and monitored
Cryptographic Algorithms
Bila uses industry-standard, publicly vetted cryptographic algorithms:
Purpose | Algorithm | Key Length | Notes |
---|---|---|---|
Symmetric Encryption | AES-GCM | 256-bit | Authenticated encryption with associated data (AEAD) |
Asymmetric Encryption | RSA | 4096-bit | Used for key exchange |
Asymmetric Encryption | ECC | P-256/P-384 | Used for digital signatures |
Hashing | SHA-256/SHA-384 | N/A | Used for integrity verification |
Key Derivation | PBKDF2 | N/A | With high iteration count |
Digital Signatures | ECDSA | P-256/P-384 | Used for API request signing |
We do not use proprietary or custom encryption algorithms. All cryptographic implementations are based on industry standards and best practices.
End-to-End Encryption
For certain sensitive operations, we support end-to-end encryption:
Client-Side Encryption
For the highest level of security, you can implement client-side encryption:
Encryption Compliance
Our encryption implementations comply with various regulatory requirements:
- PCI DSS: Meets or exceeds all encryption requirements for payment data
- GDPR: Implements appropriate technical measures for data protection
- HIPAA: Complies with encryption requirements for protected health information
- FIPS 140-2: Uses FIPS-validated cryptographic modules where required
Encryption Best Practices
When integrating with Bila, follow these encryption best practices:
- Always Use HTTPS: Ensure all connections to Bila API use HTTPS
- Validate Certificates: Implement proper certificate validation
- Keep Libraries Updated: Use up-to-date TLS libraries and security patches
- Secure Key Storage: Store API keys and encryption keys securely
- Implement Proper Key Rotation: Regularly rotate any encryption keys you manage