Privacy & Security
Compliance & Certifications
Our security standards and compliance certifications
Compliance & Certifications
Security Standards
SOC 2 Compliance
We are on the path to achieving SOC 2 compliance, upholding rigorous standards to ensure:
- Security: Protection against unauthorized access
- Availability: System reliability and availability
- Processing Integrity: Accurate, timely processing
- Confidentiality: Information designated as confidential is protected
- Privacy: Personal information is collected, used, retained, disclosed, and disposed of properly
Infrastructure Security
Cloud Infrastructure
- AWS Security Standards
- Regular security assessments
- Automated security monitoring
- Infrastructure-as-code security checks
Network Security
- Access Controls
- Multi-factor authentication
- Role-based access control
Security Operations
Continuous Monitoring
- Automated secret scanning in code repositories
- Advanced static code analysis for security vulnerabilities
- Continuous dependency security scanning
- Early detection of potential security issues
Security Measures
Data Security
-
Storage
- Encrypted storage
- Data isolation
- Retention policies
-
Transfer
- Secure API endpoints
- Certificate management
- Traffic monitoring
Contact Us
Have questions about security?