Security

Secure Infrastructure

Network Security

External traffic is filtered through a Web Application Firewall with role-based security groups.

Built on AWS

All infrastructure is deployed on AWS using secure configurations and VPCs

Data Center Redundancy


Data is stored in the Oregon (us-west-2) AWS region across multiple availability zones.
Security

Data Security

Encryption and Protection

Data is encrypted in transit using TLS 1.2+ and at rest with server-side encryption in AWS S3 and DynamoDB.

Single-Tenant Infrastructure

We offer robust single-tenant stacks for enterprise customers, allowing for increased data isolation.

Logical Segregation

All data in our multi-tenant deployments is logically segregated, and enterprise customers can elect to add organization segregation to their single-tenant deployments.
Security

Access Control

Administrator Access

Administrators can manage user roles, permissions, and access to projects.

Login Security

We support 2FA, single sign-on (SSO), and domain-based login restrictions for enhanced security.

Confidential Information

Access to customer data is restricted to authorized employees following strict confidentiality policies.
Security

Governance, Risk, and Compliance

Information Security

We maintain a formal program to monitor and enforce security controls and compliance.

Security Policies

We maintain comprehensive policies, including incident response, access control, and data retention.

Subprocessor Management

Vendors are carefully reviewed and reassessed annually to ensure compliance to security and privacy standards.

Learn more about Security & Privacy

Explore Our Whitepaper
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.