Encryption
Data is encrypted in transit using TLS and encrypted at rest using managed encryption controls in AWS. Access to encryption configuration is restricted to authorized engineering and infrastructure personnel.
Generate a draft answer pack for customer security questionnaires covering encryption, access control, incident response, backups, availability, and SOC 2 status.
SaaS teams answering customer due diligence questionnaires.
Draft answer pack with customization flags for risky claims.
Pair with SOC 2 readiness and vendor comparison tools.
Our security program is aligned with SOC 2 planned. These draft answers are tailored for mid-market customer questionnaires involving customer business data hosted on AWS.
Data is encrypted in transit using TLS and encrypted at rest using managed encryption controls in AWS. Access to encryption configuration is restricted to authorized engineering and infrastructure personnel.
Production access is limited by role, reviewed periodically, and granted through approved identity and access workflows. Administrative access is restricted to personnel with a business need and removed during offboarding.
We maintain an incident response process for identifying, triaging, escalating, and communicating security incidents. Security events are reviewed by designated owners and tracked through resolution.
Availability controls include managed cloud infrastructure, backup or recovery procedures, monitoring, and operational review. Recovery expectations should be confirmed against the service plan and customer requirements.
Our security program is aligned with SOC 2 planned. We do not treat questionnaire responses as audit opinions, and customers should review the latest report, scope, and control descriptions when available.