Skip to content

Latest commit

 

History

History
14 lines (7 loc) · 760 Bytes

SECURITY.md

File metadata and controls

14 lines (7 loc) · 760 Bytes

Security

Security architecture

We are utilizing the industry's best security practices with guidance from NIST and the latest Digital Authentication Guidelines.

Our application is continuously monitored for CVE, OSVDB, XSS, SQL injection and many other types of vulnerabilities using Snyk.

Operations

The application and server-level health and availability is monitored using New Relic and incident response is handled using Opsgenie.

We implemented our own independent monitoring and transaction testing for accurate monitoring of system and key transaction health without relying on third parties.