Security Highlights

Data Security

We encrypt data at rest and in transit for all of our customers.


Application Security

We regularly engage the industry’s best application security experts for third-party penetration tests. These penetration testers evaluate the source code, running application, and the deployed environment.

We also use high-quality static analysis tooling provided by GitHub Advanced Security, such as Dependabot, to secure our product at every step of the development process.


Infrastructure Security

We use Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem.

Additionally, since our application is built on the AWS serverless architecture, we do not typically manage servers or EC2 instances in production.