Skip to main content

SOC 2 Type II Compliance has been designed for the secure handling of data and utilizes practices proven to be secure in the cloud. We regularly audit our configurations against the latest CIS Benchmark for AWS which was created by a large community of cybersecurity experts. We also engage a third-party security firm to perform penetration testing annually.


Our comprehensive security program applies current tools and practices to network connectivity, access control (such as identity management and role controls), data handling (such as encryption), incident management, and more.