|

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

PCI DSS 4.0

Compliant

Controls

Continuously monitored

Data security

Encrypting Data At Rest

Inventory of Infrastructure Assets

Testing for Reliability and Integrity

Network security

Limit Network Connections

Transmission Confidentiality

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Endpoint security

Malicious Code Protection (Anti-Malware)

Corporate security

Organizational Structure

Roles & Responsibilities

New Hire Policy Acknowledgement

Resources

Physical Security Policy

Policy

Information Security Policy

Policy

Acceptable Usage Policy

Policy

Data Retention Policy

Policy

Access Control Policy

Policy

Endpoint Security Policy

Policy