Skip to main content

Security infrastructure

Authentication

We use the OAuth 2.0 security protocol. Each time a user logs in, Okta's Auth0 validates their credentials and generates an authentication token. This token is used for all subsequent requests made by the user. Additionally, OAuth stores user passwords and provides security alerts in case of multiple failed login attempts.

Content

We use JSON Web Tokens (JWT). Each request includes an encrypted token to ensure that the information corresponds to the authorized user making the request. Our servers validate both tokens; if either one is invalid, access to the information is denied.

Backend servers of mpservices

Our servers are hosted on Heroku, meeting the highest security standards.

Database Servers

The databases are hosted on AWS servers. We perform monthly password rotations to ensure data security.

Frequent questions:
Infrastructure, Security and Operation of the Platform

In this space we answer clearly and simply the most common questions that our clients usually have about the infrastructure, security and operation of the platform.

Where is the platform hosted?

The platform operates entirely in the cloud over Amazon Web Services (AWS), one of the most widely used and reliable infrastructure providers worldwide.

Does the platform depend on a single server?

No. The platform has replicated infrastructure, meaning it doesn't depend on a single server. This helps maintain service availability even in the event of a technical failure.

In which country is the data stored?

The data is stored in data centers located in the United States, within the AWS infrastructure.

How available is the service?

We hold an Service Level Agreement (SLA) where commitments are made regarding availability, support and incident response times.

Does the information travel securely?

Yes. All communication with the platform is done through secure connections (HTTPS), which protects the information during transmission.

Is the stored information protected?

Yes. The stored information is located encrypted within the AWS infrastructure.

How is access to the platform controlled?

Access is managed through specialized authentication systemsFor administrative access, the following is used: double verification (MFA) and each user can only access the functions that correspond to their role.

Are there access and activity logs?

Yes. The system maintains basic logs of access and relevant actionswhich can be reviewed in case of incidents or support needs.

Is the platform protected against attacks?

Yes. The infrastructure includes firewalls and protection mechanisms against common attacks and service overload.

Are backups of the information performed?

Yes. They are done. automatic backups every day.

What happens if information is lost or there is a failure?

In case of a technical failure or error, backups allow restablish the information and continue with the operation.

Where are the backups stored?

Backups are stored securely within the AWS infrastructure, separate from the main environment.

Can the platform be integrated with other systems?

Yes. The platform can be integrated with systems such as ERP, CRM, or other applicationsthrough secure connection mechanisms.

Does the platform require local installation?

No. The platform operates completely in the cloud and it is accessed via the internet.

How are incidents reported?

When a relevant failure or incidentCustomers are notified via email.

Are there customer monitoring dashboards?

Currently, there is no dashboards or monitoring panels visible to the customer.

Who owns the information?

All information uploaded and managed within the platform is customer property.

Do they comply with personal data protection regulations?

We apply measures aligned with the Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP), when applicable.

Do they have safety certifications?

We currently do not have formal certifications such as ISO or SOCHowever, we carried out security testing (PENTEST) and we apply industry best practices.

What type of support do you offer?

Support is provided in accordance with what is established in the contract and the SLAincluding contact channels and response times.

How are security responsibilities distributed?

The platform operates under a shared responsibility model:

  • We protect the infrastructure and the platform.
  • The client is responsible for the proper use of access and users.

Optimize your company's operations and automate maintenance activities with our advanced cloud-based CMMS system.

Increase your recurring revenue and the productivity of your technicians with the first Field Service Software (FSM) created for maintenance service companies.

The leading company in technological maintenance solutions with over 30 years of experience in Latin America. Committed and focused on customer satisfaction.

Powered by AWS cloud computing

          

       

© 2026 MPtotal, MPindustries and MPservices are registered trademarks of Software para Mantenimiento MP SA de CV.