Security Compliance

Earning and keeping your trust is our top priority. We build with security, privacy, and compliance in mind from day one

Certifications and Infrastructure

We maintain industry-leading certifications and build our infrastructure with security and reliability as foundational principles.

SOC 2 Type II Compliant

SOC 2 Type II Compliant

We achieved SOC 2 Type II compliance, demonstrating our commitment to maintaining high standards of security, availability, and confidentiality for your data.

Infrastructure as Code

Our infrastructure is fully managed through Terraform and Helm, ensuring version control, repeatability, and consistency across our environments.

Infrastructure as Code

Security Practices

Our security approach spans development, operations, and organizational practices to ensure comprehensive protection of your data.

Secure Development Practices

Secure Development Practices

We maintain strict version control with branch protections, code reviews, CI/CD pipelines, and automated security checks. All changes go through a documented review and approval process.

System Monitoring & Incident Response

System Monitoring & Incident Response

We monitor systems continuously and have clear procedures for logging, alerting, and incident response, guided by industry best practices.

Employee Training Background Checks

Employee Training Background Checks

Every team member completes security training and background checks through our trusted third-party provider. We foster a security-first culture rooted in transparency and responsibility.

Encryption Key Management

Encryption Key Management

Encryption in transit and at rest with region-level key management. Your data is protected by default, with fine-grained permissions and full auditability.

Need to get in touch?

Have a security concern or question? We're here to help and committed to transparency.