Skip to main content

Overview

  • Physical and operational security of our data centers follows AWS/GCP standards
  • Network communications use TLS encryption with IDS/IPS, firewalls, and traffic distribution to mitigate DoS attacks
  • Virtualization is used to isolate data between users
  • Service access is protected with ID/password authentication
  • Logs are retained for at least six months
  • Vulnerability assessments are performed at least once per year
  • The SOC 2 Type 1 audit has been completed

System Architecture

System architecture diagram
Note: This diagram shows the AWS configuration. Updated August 2025.