We’ve passed our Type I and Type II audits. As part of those, we completed an end-to-end review of our application infrastructure, company policies, and our processes. This included everything from how we work with vendors and how we hire, to how we build a product that serves our customers. Contact us for a copy of our report.
We’ve built Multitudes with security and data privacy in mind from the ground up. We follow modern cloud infrastructure practices, including infrastructure as code, continuous integration with automated test suites, encryption at rest and in transit, and separate environments for testing and production.
We have chosen Amazon Web Services as our cloud service provider due to their comprehensive compliance offerings and excellent track record of platform security. More details regarding AWS Compliance offerings can be found here.
We only collect the data we need, and we refrain from collecting personally identifiable information where possible; the only identifiers we store on individual users is their public Github username and an alias that you decide (e.g., first name). You are the owner of your data, and have full control over our access to your data – you can ask us to erase your data at any time (though we hope that you love us so much that you won’t want to leave!). We will never sell your data to third parties in any form.
All of our services are hosted on Amazon Web Services (AWS) inside a virtual private cloud (VPC). We do not maintain any physical servers.
We use version-controlled AWS roles to manage access to all resources in each environment. We adhere to the principle of least privilege when it comes to resource permissions.
We have separate AWS environments for development, staging, and production. No customer data is ever used in our development or staging environments.
Any changes to infrastructure are made using Terraform. This means that all changes are peer-reviewed, automated, and version-controlled, which keeps our services secure and auditable.
We run comprehensive automated testing suites for any code change.
We use CircleCI to continuously deploy to all our environments. Deployments to prod require manual intervention from a reviewer, after checking changes in the dev and staging environments.
We use Cloudtrail to log AWS access and Cloudwatch to log application access. In addition, we use AWS Security Hub to help ensure that we follow best practices and alert us of potential issues.
We continuously patch software on all applications with the latest available updates.
We only give login information for our insights dashboard to the list of emails you’ve given us, and you can change that list at any time.
You control the data that we are allowed to access. The data we require is shown in a list when you are installing our GitHub plugin, and you can revoke that access at any point by uninstalling our plugin.
All data is encrypted at rest using AES-256 encryption, and during transit using SSL/TLS 1.2.
We use AWS-managed services to run backups and versioning of data.
We use AWS CloudWatch for monitoring of all systems so that there is visibility over all actions taken in our AWS environments.
All Multitudes employees must enable multi-factor authentication on all core tools and services.
All employee and contractor agreements include a confidentiality clause.
We will be pursuing security certifications that are appropriate for our risk profile in the future.
We have completed an AWS Well-Architected Review with an AWS Solutions Architect and will continue to develop and improve our infrastructure in accordance with their best practices.
We use a Mobile Device Management (MDM) service to manage all Multitudes devices. This allows us to have full control of a device and enforce the latest security updates and features.
All of our services are hosted on Amazon Web Services (AWS) inside a virtual private cloud (VPC). We do not maintain any physical servers.
We use version-controlled AWS roles to manage access to all resources in each environment. We adhere to the principle of least privilege when it comes to resource permissions.
We have separate AWS environments for development, staging, and production. No customer data is ever used in our development or staging environments.
Any changes to infrastructure are made using Terraform. This means that all changes are peer-reviewed, automated, and version-controlled, which keeps our services secure and auditable.
We run comprehensive automated testing suites for any code change.
We use CircleCI to continuously deploy to all our environments. Deployments to prod require manual intervention from a reviewer, after checking changes in the dev and staging environments.
We use Cloudtrail to log AWS access and Cloudwatch to log application access. In addition, we use AWS Security Hub to help ensure that we follow best practices and alert us of potential issues.
We continuously patch software on all applications with the latest available updates.
We only give login information for our insights dashboard to the list of emails you’ve given us, and you can change that list at any time.
You control the data that we are allowed to access. The data we require is shown in a list when you are installing our GitHub plugin, and you can revoke that access at any point by uninstalling our plugin.
All data is encrypted at rest using AES-256 encryption, and during transit using SSL/TLS 1.2.
All Multitudes employees must enable multi-factor authentication on all core tools and services.
All employee and contractor agreements include a confidentiality clause.
We have completed an AWS Well-Architected Review with an AWS Solutions Architect and will continue to develop and improve our infrastructure in accordance with their best practices.
We will be pursuing security certifications that are appropriate for our risk profile in the future.
Visit our help center to get more information about our key security practices, policies, and contact details.