Configuration Encrypted
-----------------------

In order to help protect customer data and service stability the system
configuration files are frequently recreated by the platform. This means
that even malicious tampering to the platform will generally be undone
by a simple restart. The configuration data is stored in the platform’s internal files.
These files are encrypted using
a strong AES encryption layer to make them tamper-proof. They are never
decrypted on disk, instead the applications which manage them will
decrypt them in memory, read and make modifications as needed and then
re-encrypt the data before writing them back to disk.

In this way the risk of tampering or data theft through the
configuration system is greatly minimized.