Start your security review
View & download sensitive information
Overview
Share your security posture with prospects and customers.
Compliance
SOC 2 II
SOC 2 Type II
SOC 3
SOC 3
ISO 27001
ISO/IEC 27001:2022
ISO 27017
ISO/IEC 27017:2015
CSA STAR
CSA STAR Level 1
NIST 800-53
NIST 800-53
CIS
CIS Controls
GDPR
GDPR
Sub-Processors
(10)Third-party vendors that process data on our behalf
| Vendor |
|---|
Cloud Infrastructure United States |
Cloud Infrastructure United States |
Payment Processing United States |
Monitoring & Observability United States |
Error Tracking United States |
Email Delivery United States |
Customer Support United States |
CDN & Security United States |
Code Repository United States |
Slack Team Communication United States |
Security FAQ
(10)Common security questions and answers
Application & Interface Security
- Application Security Testing
- Secure Development Lifecycle
- Code Review
- API Security
Change Control & Configuration Management
- Change Management Process
- Configuration Management
- Release Management
- Rollback Procedures
Cryptography, Encryption & Key Management
- Encryption at Rest
- Encryption in Transit
- Key Management
- Certificate Management
Datacenter Security
- Physical Access Controls
- Environmental Controls
- Video Surveillance
- Power Redundancy
Data Security & Privacy
- Data Classification
- Data Retention Policy
- Data Residency
- Privacy Policy
Governance, Risk & Compliance
- Information Security Policy
- Risk Assessment
- Risk Register
- Security Governance
Audit & Assurance
- SOC 2 Type II
- ISO 27001
- Independent Audits
- Internal Audits
Human Resources Security
- Background Checks
- Security Awareness Training
- Acceptable Use Training
- Role-Based Training
Identity & Access Management
- Multi-Factor Authentication
- Single Sign-On
- Role-Based Access Control
- Least Privilege Principle
Infrastructure & Virtualization Security
- Cloud Provider Security
- Network Segmentation
- Firewall Protection
- DDoS Protection
Interoperability & Portability
- Data Export
- API Access
- Standard Data Formats
- Migration Assistance
Logging & Monitoring
- Security Event Logging
- Centralized Log Management
- Real-Time Monitoring
- Log Retention
Security Incident Management
- Incident Response Plan
- Incident Response Team
- Incident Classification
- Customer Notification
Supply Chain Management
- Vendor Security Assessment
- Subprocessor List
- Vendor Risk Management
- Contractual Security Requirements
Threat & Vulnerability Management
- Vulnerability Scanning
- Patch Management
- Threat Intelligence
- Vulnerability Remediation SLA
Universal Endpoint Management
- Endpoint Detection & Response
- Mobile Device Management
- Disk Encryption
- Anti-Malware Protection