Compliance & Certifications

Security Standards

SOC 2 Compliance

We are on the path to achieving SOC 2 compliance, upholding rigorous standards to ensure:

  • Security: Protection against unauthorized access
  • Availability: System reliability and availability
  • Processing Integrity: Accurate, timely processing
  • Confidentiality: Information designated as confidential is protected
  • Privacy: Personal information is collected, used, retained, disclosed, and disposed of properly

Infrastructure Security

Cloud Infrastructure

  • AWS Security Standards
    • Regular security assessments
    • Automated security monitoring
    • Infrastructure-as-code security checks

Network Security

  • Access Controls
    • Multi-factor authentication
    • Role-based access control

Security Operations

Continuous Monitoring

  • Automated secret scanning in code repositories
  • Advanced static code analysis for security vulnerabilities
  • Continuous dependency security scanning
  • Early detection of potential security issues

Security Measures

Data Security

  • Storage

    • Encrypted storage
    • Data isolation
    • Retention policies
  • Transfer

    • Secure API endpoints
    • Certificate management
    • Traffic monitoring

Contact Us

Have questions about security?