Security
Application Security
We follow best practices of modern web browser security by supporting HTTP strict transport security protocols (HSTS) and a content security policy (CSP).
All traffic is encrypted in transit via TLS 1.3.
All application data is encrypted at rest with AES 256-GCM.
Application Security
Non-critical operations leverage cloud infrastructure that has undergone SOC 2 type examination.
We use Amazon Web Services Cloud for infrastructure and security sensitive services are isolated on separate virtual machines/containers to defend against Specter class vulnerabilities.
We’ve built an integrated monitoring system to automatically detect, alert and mitigate potential attacks.
We use Amazon Web Services Cloud for infrastructure and security sensitive services are isolated on separate virtual machines/containers to defend against Specter class vulnerabilities.
We’ve built an integrated monitoring system to automatically detect, alert and mitigate potential attacks.