Security

Enterprise-Grade Security

Your data security is our highest priority. We implement industry-leading security practices to protect your charging infrastructure.

Last Updated: October 27, 2025

At EV Echos, security is embedded in everything we do. From infrastructure design to application development, we follow a security-first approach. Our comprehensive security program protects your charging network data, ensures platform availability, and maintains the trust our customers place in us. We continuously evolve our security measures to address emerging threats and maintain compliance with global security standards.

Infrastructure Security

Cloud Infrastructure

Our platform runs on enterprise-grade cloud infrastructure with multi-region redundancy. We use leading cloud providers with SOC 2 Type II and ISO 27001 certifications, ensuring the highest standards of physical and logical security.

Network Architecture

Distributed denial-of-service (DDoS) protection, Web application firewall (WAF) with real-time threat intelligence, Virtual private cloud (VPC) isolation, and intrusion detection and prevention systems (IDS/IPS) protect our network 24/7.

Data Centers

Our data centers feature biometric access controls, 24/7 security monitoring and surveillance, redundant power and cooling systems, fire suppression systems, and seismic protection in applicable regions.

Data Encryption

Encryption at Rest

All data stored on our platform is encrypted using AES-256 encryption, the same standard used by banks and government agencies. Database encryption keys are managed through hardware security modules (HSM) with automatic key rotation.

Encryption in Transit

All data transmitted to and from our platform uses TLS 1.3 encryption with perfect forward secrecy. We enforce HTTPS across all connections and reject insecure protocols. API communications are encrypted end-to-end.

Key Management

Encryption keys are stored in FIPS 140-2 Level 3 validated HSMs, with automatic rotation every 90 days. Keys are never stored in plaintext and are protected by multi-layer access controls. We maintain separate encryption keys per customer for data isolation.

Access Controls & Authentication

Multi-Factor Authentication

We require MFA for all administrative access and offer optional MFA for all users. Supported methods include authenticator apps (TOTP), SMS verification, hardware security keys (WebAuthn/FIDO2), and biometric authentication.

Role-Based Access Control

Granular permission system with principle of least privilege, customizable roles and permissions, audit logging of all access attempts, automatic session timeouts, and IP whitelisting for sensitive operations.

Single Sign-On (SSO)

Enterprise customers can integrate with their existing identity providers via SAML 2.0 or OpenID Connect. We support major identity providers including Okta, Azure AD, Google Workspace, and Auth0.

API Security

API keys with customizable scopes and expiration, OAuth 2.0 and JWT token authentication, rate limiting and throttling protection, IP-based access restrictions, and comprehensive API activity logging.

Network Security

Perimeter Defense

Multi-layer firewall architecture, automated threat detection and blocking, geographic access controls, and real-time traffic analysis. Our network is continuously monitored for anomalous behavior and potential threats.

Secure Architecture

Network segmentation isolates critical systems, private subnets for database and backend services, bastion hosts for administrative access, and zero-trust network architecture principles.

DDoS Protection

Enterprise-grade DDoS mitigation capable of handling attacks up to 10+ Tbps. Automatic traffic scrubbing, global load balancing, and anycast network routing ensure service availability during attacks.

Application Security

Secure Development

We follow secure coding practices including OWASP Top 10 guidelines, static and dynamic code analysis, dependency vulnerability scanning, peer code review requirements, and security testing in CI/CD pipeline.

Vulnerability Management

Regular penetration testing by independent security firms, automated vulnerability scanning, bug bounty program for responsible disclosure, 24-hour SLA for critical security patches, and coordinated vulnerability disclosure process.

Input Validation

All user inputs are validated and sanitized to prevent injection attacks. We implement parameterized queries, content security policies, and strict type checking throughout our codebase.

Monitoring & Incident Response

24/7 Security Monitoring

Our Security Operations Center (SOC) monitors platform activity around the clock using advanced SIEM (Security Information and Event Management) tools, automated anomaly detection, and real-time alerting.

Incident Response

Dedicated incident response team available 24/7, documented incident response procedures, post-incident analysis and reporting, regular incident response drills, and automated incident escalation protocols.

Audit Logging

Comprehensive logging of all system activities including user authentication and access attempts, configuration changes, data access and modifications, API calls, and administrative actions. Logs are retained for 1 year and protected from tampering.

Threat Intelligence

We maintain subscriptions to multiple threat intelligence feeds, participate in industry information sharing groups, and use machine learning for advanced threat detection.

Security Audits & Testing

Independent Audits

Annual SOC 2 Type II audits, ISO 27001 certification audits, quarterly penetration testing by certified ethical hackers, and regular compliance assessments for industry-specific regulations.

Internal Security Testing

Continuous automated security scanning, weekly vulnerability assessments, monthly security reviews, and annual disaster recovery testing.

Third-Party Assessments

We engage independent security firms to perform comprehensive security assessments including network penetration testing, application security testing, social engineering testing, and physical security audits.

Data Protection & Privacy

Data Minimization

We collect only the data necessary for platform functionality. Data retention policies ensure information is deleted when no longer needed. Customers maintain control over their operational data.

Data Isolation

Customer data is logically isolated in multi-tenant environments. Database-level access controls prevent cross-customer data access. Separate encryption keys per customer ensure cryptographic isolation.

Backup & Recovery

Automated encrypted backups every 6 hours, geographically distributed backup storage, point-in-time recovery capabilities, regular backup restoration testing, and 99.99% data durability guarantee.

Data Deletion

Secure data deletion upon customer request, cryptographic erasure of encryption keys, multi-pass overwriting of physical media, and documented data destruction procedures.

Security Certifications

Independently verified security and compliance

SOC 2 Type II

Certified

Annual third-party audit of security controls

ISO 27001

Certified

Information security management system

GDPR

Compliant

EU General Data Protection Regulation compliance

CCPA

Compliant

California Consumer Privacy Act compliance

Responsible Disclosure Program

We welcome reports from security researchers who discover vulnerabilities in our systems. Our bug bounty program rewards responsible disclosure of security issues. We commit to responding to all reports within 24 hours and providing regular updates on remediation progress.

To report a security vulnerability, please email security@evechos.com with details. We request that you do not publicly disclose the issue until we have had sufficient time to address it.

Questions About Security?

Our security team is available to discuss our security practices and answer your questions

Contact Security Team