How does runZero keep customer data secure?

Modified on Wed, Oct 25, 2023 at 1:37 PM

Here are some of our standard security policies:

  • Customer data is logically separated within a single database.
  • Data is encrypted at rest and in transit.
  • Audit logs for customer activity are available within the console, under Alerts > Events.
  • As per our security policy, we notify customers of any security breach within a set time window.
  • All staff with privileged access are required to use hardware multifactor authentication tokens. In addition:
    • Staff access to customer data using the runZero console is recorded in an audit log.
    • Staff access to cloud systems used to host the platform is recorded in an audit log.
    • Cloud database access is restricted to a subset of technical staff.
  • As a company, we are SOC 2 type II compliant.
  • We obtain an annual security audit from an independent security company, who have access to product source code for their analysis.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article