Security at 1Fort

Your trust is our number one priority. We're committed to safeguarding data following industry-leading standards.

SOC 2 Type II compliant

We work with an independent auditor to maintain SOC 2 Type 2 compliance which objectively certifies our controls to ensure the continuous security, availability, confidentiality, and integrity of our customers' data.

Personnel

Only vetted personnel are given access to sensitive resources.

Development

Security best-practices are integrated in the development lifecycle for all projects.

Testing

Regular pen testing and vulnerability scanning of systems.

Cloud

Complete data isolation in a modern cloud architecture.

Data Security

1Fort encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

Application Security

1Fort regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.

Infrastructure Security

1Fort uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.