Security at 1Fort
Your trust is our number one priority. We're committed to safeguarding data following industry-leading standards.
SOC 2 Type II compliant
We work with an independent auditor to maintain SOC 2 Type 2 compliance which objectively certifies our controls to ensure the continuous security, availability, confidentiality, and integrity of our customers' data.
Only vetted personnel are given access to sensitive resources.
Security best-practices are integrated in the development lifecycle for all projects.
Regular pen testing and vulnerability scanning of systems.
Complete data isolation in a modern cloud architecture.
Data Security
1Fort encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.
Application Security
1Fort regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.
Infrastructure Security
1Fort uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.