Security Audits

We use numerous logging services to provide an audit trail over our infrastructure. Auditing allows us to do ad-hoc security analysis, track changes made to our set-up, and audit access to every layer of our stack.

Moreover, we employ recurring scans and penetration tests to expose system vulnerabilities and resolve them.

Finally, our Risk and Compliance manager oversees a policy and controls framework that relies on a robust collection of compliance artifacts.