Security & Compliance

Enterprise-Grade Security

Your financial data is our most sacred responsibility. We protect it with the highest security standards in the industry.

SOC 2 Type II

Complete controls framework implemented. Independent audit scheduled.

Audit Ready

GDPR Compliant

Full compliance with EU data protection regulations. Data subject rights implemented.

Compliant

ISO 27001

Information security management system fully implemented.

Audit Ready

PCI DSS

Payment card data never stored. Stripe/payment processor handles compliance.

N/A (Delegated)

Security Features

Multiple layers of protection for your data.

Encryption at Rest

All data encrypted using AES-256 encryption. Encryption keys managed through AWS KMS with automatic rotation.

Encryption in Transit

TLS 1.3 for all data transmission. Perfect forward secrecy ensures session keys cannot be compromised.

Field-Level Encryption

Sensitive fields like bank accounts and SSNs have additional encryption layer with separate key management.

Multi-Factor Authentication

TOTP, SMS, and hardware key (WebAuthn) support. MFA can be enforced at organization level.

Role-Based Access Control

80+ granular permissions. Create custom roles or use pre-built templates for common finance roles.

Complete Audit Trail

Every action logged with user, timestamp, IP, and device. Logs are immutable and retained per your policy.

SSO & SCIM

SAML 2.0 single sign-on. SCIM 2.0 for automatic user provisioning and deprovisioning.

Anomaly Detection

AI monitors for suspicious activity, unusual access patterns, and potential security threats.

Data Protection

Your data belongs to you. We give you complete control over where it's stored, how long it's kept, and how it's accessed.

Data Residency

Choose where your data is stored. Available regions include US, EU, UK, Canada, Australia, and Middle East.

Data Retention

Configurable retention policies. Automatic data purging based on your compliance requirements.

Data Backup

Continuous backup with point-in-time recovery. Data replicated across multiple availability zones.

Data Export

Export all your data at any time. Full data portability with standard formats (JSON, CSV).

Infrastructure

Cloud ProviderAWS (Primary), GCP (DR)
Data CentersTier III+ certified facilities
NetworkVPC isolation, WAF protection
DDoS ProtectionAWS Shield Advanced
Uptime SLA99.9% guaranteed
Backup FrequencyContinuous with 30-day retention

Built for Compliance

Tools and features designed to help you meet regulatory requirements.

GDPR Tools

Built-in tools for data subject requests (access, deletion, portability). Consent management and processing records.

SOX Controls

Segregation of duties, approval workflows, and audit trail features designed for SOX compliance.

Data Governance

Data catalog, lineage tracking, and DLP policies to maintain control over sensitive information.

Evidence Collection

Secure evidence room for audit preparation. Chain of custody tracking and legal hold support.

Security Practices

How we keep your data safe every day.

Secure Development

  • Security-first code reviews
  • Automated vulnerability scanning
  • Dependency monitoring (Dependabot)
  • OWASP Top 10 compliance

Penetration Testing

  • Annual third-party pen tests
  • Continuous bug bounty program
  • Automated security scanning
  • Red team exercises

Incident Response

  • 24/7 security monitoring
  • Documented incident response plan
  • < 1 hour initial response time
  • Post-incident review process

Employee Security

  • Background checks required
  • Security awareness training
  • Principle of least privilege
  • Regular access reviews

Bug Bounty Program

We believe in the security community. Our bug bounty program rewards responsible disclosure of security vulnerabilities.

  • Rewards up to $10,000 per vulnerability
  • Safe harbor for researchers
  • Hall of fame recognition
  • Quick response times
Report a Vulnerability

$50,000+

Paid to researchers

Questions About Security?

Our security team is here to answer your questions and provide documentation for your security review.