Security
at Infostrux
Learn about how your data is handled and how we comply with industry security standards
Security program highlights
As a consulting company, we focus on the engineering approach to everything we do. We work with the principle of a security-first approach to everything we do, and at no point does customer data ever come to our work computers. Each client is isolated from the other both physically and virtually.
Check out our Trust Report. Vanta identifies security flaws and privacy gaps in a company’s security posture by connecting to core systems to continuously monitor an organization’s cloud infrastructure, endpoints, corporate procedures, enterprise risk, and employee accounts.
Data Security
Infostrux encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service's Key Management System (KMS) to manage encryption keys and robust certified Snowflake security.
Infrastructure Security
Infostrux uses Amazon Web Services to host our application. We fully utilize the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. In addition, we deploy our application using containers, serverless run on AWS-managed services, meaning we typically do not manage servers or EC2 instances in production.
Application Security
Infostrux also uses high-quality static analysis tooling provided by GitHub Advanced Security, such as Dependabot, to secure our product at every step of the development process.
System & Organization Controls (SOC) 2 Type II
Infostrux has completed the System and Organization Controls (SOC) 2 Type II examination in recognition of its commitment to information security. This attestation defines criteria for managing customer databases on five "trust service principles" — security, availability, processing integrity, confidentiality, and privacy. Learn more about our SOC2 attestation in our blog.