Introduction
Security is important to us. We use SSL and TLS security and file encryption at rest to protect your data. You can also add user-controlled AES encryption and decryption for your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure.PDF.co API Security Features
Hosting
PDF.co is hosted on world-class Amazon AWS infrastructure:- High availability cluster design: Includes robust design features for reliability.
- Temporary files: Stored on the cloud storage with strong encryption at rest.
- API logs: Saved for the user and available for review by user. Sensitive details are redacted or removed.
API Logging
Special “Strict API logging” is available for working with a sensitive data.- In this mode all
Request,BodyandResponseare redacted completely and not visible even to account owners. In other words, input and output parameters are not saved into API logs.
System Security & Maintenance
Documents and data processing: Processed in-memory with specific exceptions handled securely. Crash reports: Generated with redaction of user identifiable information. Server maintenance: Regularly auto-rotated and replaced with new clean server images. Allowed IP list Restrict access to the API and/or UI to a set of IP addresses only. Available throughAccount - Security in the PDF.co dashboard.
Single-sign on (SSO, SAML)
SSO mitigates compliance and security risks for organizations by giving businesses control over user authentication and user revocation via corporate-mandated tools.
The availability of specific security features may vary depending on your subscription plan.
File Handling
Generated output files: Securely stored, encrypted at rest, and auto removed.- Output links automatically expire in
1hour by default (can be decreased down to1minute or increased up to24days via theexpirationparameter). - Uploaded and output files can also be explicitly removed using the file/delete API method.
- You can also leverage user-controlled data encryption parameters to encrypt the content of output files automatically.
- Store documents, images, pdf templates, and other files for re-use in the API.
- Files from the storage are available via randomly generated file tokens.
- Available only for internal use by the PDF.co API via special
filetoken://protocol.
- Use
passwordparameter to include the password to open protected pdf files
- The PDF.co API provides a /pdf/security/add endpoint that can enable built-in pdf documents protection:
- Disable or enable printing
- Disable or enable copying of content
- Add or remove user or owner password
- Add or remove document permissions (printing, data extraction, merging)
- Add digital signature
- Use
httpusernameandhttppasswordfor http based authentication (viahttps) protocol;
Encryption Options
User Controlled Data Encryption (AES encryption) for input and output files For additional security, the platform can decrypt input files on a byte level and encrypt output files on a byte level with user controlled strong encryption (AES).
-
Automatically encrypt output files with strong
AESencryption - Automatically decrypt input files previously encrypted with industry standard AES encryption
- Supported encryption algorithms:
-
256-bitAES encryption and decryption -
192-bitAES encryption and decryption -
128-bitAES encryption and decryption - User-controlled encryption parameters are supported by all endpoints that read or generate files
- User controlled decryption for input files and encryption for output files can be used simultaneously within the same API call. Please check User-Controlled Encryption for more details and sample parameters.
Example Process
How exactly are PDF documents processed by the API in terms of security? Below is an example sequence for thepdf/edit/add process via our API:
- Our API receives a request with an input link.
- The request is logged in the API logs for the account unless “Strict API Logs” mode is enabled.
- The backend server processes the request.
- The backend server loads the source file from the provided URL into memory. Our own PDF engine parses the PDF in memory.
- The backend server updates the PDF in memory by adding text, filling out fields, and adding images.
- The backend server generates the final PDF and saves it into the non-public encrypted “pdf-temp-files” hosted on Amazon AWS, which is encrypted at rest by strong AES encryption.
- The input PDF and is removed from server memory in accordance with the expiration time.
- The backend server uses Amazon AWS to generate a temporary signed link to access the output file for a limited period of time, which is controlled via the expiration parameter.
- The backend server sends the output link back to the requester.
- The output link is logged in the API logs for the account unless “Strict API Logs” mode is enabled.
Data Transmission
Security is important for us. We use forced SSL and TLS security and file encryption at rest to protect your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure. We do not use any 3rd party API to process your documents, everything is processed on our servers only.Data Encryption
Your connections to the application and API require Transport Layer Security Secure (TLS) and Secure Sockets Layer (SSL), cryptographic protocols designed to provide communications security over a computer network. Encryption is used to ensure a high level of security and privacy. When you upload documents and files, they are transmitted via encrypted connections. Your permanent files are stored behind a firewall and authenticated against the sender’s session every time a request for that file is made. We enforce the use of industry best practices for the transmission of data to our platform (Transport Layer Security TLS) and data is stored in SOC 1 Type II, SOC 2 Type I, and ISO 27001 certified data centers at Amazon AWS cloud. Your documents are stored and encrypted at rest using AES 256-bit encryption. When a file is generated by our server, it is stored under a randomized name to provide a unique link which is not possible to guess. Then the file is permanently removed after 1 hour by default. Generated files can also be removed right away using a File Upload API method at any time.Data Security
Servers and data are hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:- ISO 27001
- SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II)
- PCI Level 1
- FISMA Moderate
- Sarbanes-Oxley (SOX)
- AWS also provides an environment that enables businesses to comply with HIPAA regulations.
Physical Security
PDF.co utilizes ISO 27001, FISMA, HIPAA certified data centers managed by Amazon. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state-of-the-art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. Amazon only provides data center access and information to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely. For additional information see: https://aws.amazon.com/securitySecurity Frameworks
SOC 2 compliance:- PDF.co is SOC 2 (Type 2) compliant. Contact us for more information.
- PDF.co runs on SOC 2 compliant data centers provided by Amazon AWS (see
Data Security and Physical Securitysections above.
- Document Encryption and Data Encryption support:
-
pdf/security/addandpdf/security/removeendpoints provide support for adding a password to PDF and setting up security permissions. -
All endpoints include the
passwordparameter for reading password protected pdf files. -
User-controlled data encryption (
AES 128,AES 192,AES 256) and AES decryption are available for auto-encrypting output files and auto-decrypting input files and documents. User-controlled data encryption is compatible with the user-controlled encryption settings in leading online platforms (such as SalesForce and others).
International Data Transfers and EU Standard Contractual Clauses
Standard Contractual Clauses for Data Protection
PDF.co uses Amazon Web Services (AWS) infrastructure for data processing. AWS provides Standard Contractual Clauses (SCCs) through their Data Processing Addendum (DPA), enabling customers to transfer data from Europe to the United States and to other countries outside Europe in compliance with EU data protection laws, including GDPR.What This Means for Your Organization
If your organization requires that:- Data be processed only in jurisdictions providing adequate protection comparable to EU or German law
- Transfers to third countries occur only where applicable legal safeguards are in place (e.g., EU Standard Contractual Clauses)
Additional Compliance
AWS maintains:- Data Processing Addendum (DPA) with Standard Contractual Clauses
- SOC 2 compliance certification