How We Protect Your Data
Secure Infrastructure
Network Security
External traffic is filtered through a Web Application Firewall with role-based security groups.
Built on AWS
All infrastructure is deployed on AWS using secure configurations and VPCs.
Data Center Redundancy
Data is stored in the Oregon (us-west-2) AWS region across multiple availability zones.
Data Security
Encryption and Protection
Data is encrypted in transit using TLS 1.2+ and at rest with server-side encryption in AWS S3 and DynamoDB.
Single-Tenant Infrastructure
We offer robust single-tenant stacks for enterprise customers, allowing for increased data isolation.
Logical Segregation
All data in our multi-tenant deployments is logically segregated, and enterprise customers can elect to add organization segregation to their single-tenant deployments.
Access Control
Administrator Access
Administrators can manage user roles, permissions, and access to projects.
Login Security
We support 2FA, single sign-on (SSO), and domain-based login restrictions for enhanced security.
Confidential Information
Access to customer data is restricted to authorized employees following strict confidentiality policies.
Governance, Risk, and Compliance
Information Security
We maintain a formal program to monitor and enforce security controls and compliance.
Security Policies
We maintain comprehensive policies, including incident response, access control, and data retention.
Subprocessor Management
Vendors are carefully reviewed and reassessed annually to ensure compliance to security and privacy standards.
Learn more about Security & Privacy
Explore Our Whitepaper