Image
SECURITY

Security, Privacy and Compliance

Our industry-leading security, third-party audits, certifications and documentation support your compliance.
Request Demo

STRATEGIC SECURITY

Secure, high performing & efficient


Image

Prevent


We define user permissions and identities, infrastructure protection and data protection measures.

Image

Detect


We enable visibility into security posture with logging and monitoring. Information can be scaled for event mgmt, testing and auditing.

Image

Respond


Incident response and recovery is automated so that the primary focus of security shifts from response to root cause analysis.

Image

Remediate


We leverage event driven automation to quickly remediate and secure the cloud environment in near real-time.

SOC 2 compliance


The SOC 2 Type II is a report based on the Auditing Standards Board of the American Institute of Certified Public Accountants' (AICPA) existing Trust Services Criteria (TSC). The purpose of this report is to evaluate an organization’s information systems relevant to security, availability, processing integrity, confidentiality, and privacy.

SSAE 18 / ISAE 3402 Type II


The AICPA created the Statement on Standards for Attestation Engagements No. 18 (SSAE 18) to keep pace with globally recognized international accounting standards. SSAE 18 aligns closely with the International Standard on Assurance Engagements 3402 (ISAE 3402), both of which are used to generate a report by an objective third party attesting to a set of assertions made by an organization about its controls. 

ENCRYPTION

Encryption at physical and additional layers


All Scopeworker data flow is automatically encrypted at physical and additional layers. For example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections. 

CUSTOMER DATA

Encrypted customer data in transit & rest


We encrypt customer data in transit and at rest to ensure that only authorized users can access it, using keys managed by a Key Management System (KMS) or managing encryption keys with CloudHSM using FIPS 140-2 Level 3 validated HSMs.