Compliance

Resources
View all 16 resourcesSOC 2 Type I
Penetration test
Access Control Policy (EN)
Asset Management Policy (EN)
Business Continuity and Disaster Recovery Plan (EN)
Code of Conduct (EN)
Cryptography Policy (EN)
Data Management Policy (EN)
Human Resource Security Policy (EN)
Incident Response Plan (EN)
Controls
Updated about 3 hours agoInfrastructure security
Unique production database authentication enforced
Unique account authentication enforced
Production application access restricted
View 6 more Infrastructure security controlsOrganizational security
Production inventory maintained
Anti-malware technology utilized
Password policy enforced
View 1 more Organizational security controlProduct security
Data encryption utilized
Control self-assessments conducted
Internal security procedures
Cybersecurity insurance maintained
Board charter documented
Data collected
Customer personally identifiable information
Employee personally identifiable information
Credit card information
Personal health information
Subprocessors
View all 6 subprocessorsDigitalOcean•Cloud provider
GitHub•Version control

Google Workspace•Identity provider
Linear•Task manager
