Data Security
Our approach to security and data protection
We check all the boxes so you can focus on what you do best, building your app and serving your customers.
SOC 2 Type II Certified
Annual third party security penetration tests
External code audits
Security
We protect your data with modern encryption, strong identity controls, and continuous monitoring validated by independent testing and audits.
Encryption & key management
AES-256 at rest and TLS 1.2+ in transit, with keys managed and rotated via KMS.
SSO, MFA & RBAC
SAML/OIDC SSO, enforced MFA for admins, and least-privilege roles across apps and APIs.
Monitoring & incident resposnse
Centralized SIEM/EDR, alerting on anomalies, 24/7 on-call, and a documented IR plan.
Vulnerability & pen testing
Continuous scanning with severity-based SLAs, plus annual third-party penetration tests and verified remediation.
Audit logging & change control
Immutable admin/data-access logs, code reviews, and gated CI/CD with approvals.
Backups, BC/DR & uptime
Point-in-time backups, tested restores, defined RPO/RTO, and multi-AZ availability targets.
SOC 2 Type II Certified
An independent auditor has verified the design and effectiveness of our security controls over a 12-month period. Access the latest report, pen-test summary, and core security policies in the Trust Center.
FAQs
Get clear answers to the most common questions about our security, compliance, and data practices. We're committed to transparency and helping you make informed decisions.



