Skip to main content

Trust Center

Our security framework is designed to support a wide range of industry standard controls to ensure robust protection of your data and infrastructure. We comply with established best practices and regulatory requirements.

Compliance

SOC2 Type II

SOC 2 Type II is a rigorous auditing standard that evaluates an organization's information systems relevant to security, availability, processing integrity, confidentiality, and privacy. Achieving SOC 2 Type II compliance demonstrates our commitment to maintaining a high level of data security and operational excellence.

ISO 27001

ISO 27001 is an internationally recognized standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring it remains secure. By adhering to ISO 27001, we ensure that our data protection measures are robust and comprehensive, safeguarding your information against potential threats.

Controls

Product SecurityInfrastructure SecurityData Security
Role-Based Access ControlPhysical SecurityEncryption at-rest
Single Sign-On (SSO)ZTNA / VPNEncryption in transit
Audit LoggingLoad BalancersPassword Hashed (Argon2id)
Data SecurityTLS/SSL SupportData remains in your environment
OWASP StandardLeast Privilege Principle
⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤
Application Security
Privacy and Data Management
Reports
Secure SDLCSecure Data StorageNetwork Diagram
Code ReviewsData HandlingArchitecture Diagrams
Secret DetectionData MinimizationPenfield App Architecture
Code AnalysisData StoragePentest Report
Container ScanningData at Termination
Dependency Scanning
Security Vulnerabilities
⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤
Access Control
Corporate Security
Security Grades
Data AccessEmail ProtectionQualys SSL Labs
LoggingEmployee Training
Password SecurityIncident Response
Monitoring and LoggingEndpoint Security
Identity Management
MFA
⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤⏤
Policies
Legal & HR
Support
Acceptable Use PolicyPrivacy PolicyCustomer Support
Access Control PolicyBackground CheckSLA
Information Security Policy