Compliance posture
- We align our security practices with SOC 1 control objectives and industry best practices, and design and operate controls using themes comparable to widely used frameworks (including SOC 2 and ISO 27001, for example access control, encryption, and logging).
- We do not currently publish independent third-party attestations (such as SOC 2 Type II or ISO 27001 certification). We can support vendor security questionnaires and calls for customers who need additional detail.