Security You Can Trust
We monitor your compliance. Here's how we maintain ours.
Compliance Certifications
SOC 2 Type II
Audited annually by independent third-party auditors
ISO 27001
Information security management system certification
GDPR Compliant
Full compliance with EU data protection regulations
How We Protect Your Data
Encryption Everywhere
- In Transit: TLS 1.3 for all connections
- At Rest: AES-256 encryption for all stored data
- Passwords: bcrypt hashing with salt (never stored in plain text)
- Database: Encrypted backups with separate key management
Access Control
- Role-Based Access Control (RBAC): Principle of least privilege
- Multi-Factor Authentication: Optional 2FA for all accounts
- Session Management: Secure session tokens with auto-expiry
- API Keys: Scoped permissions and rotation policies
Infrastructure Security
- Cloud Hosting: AWS GovCloud with dedicated VPCs
- Network Security: Firewalls, DDoS protection, intrusion detection
- Monitoring: 24/7 security event monitoring and alerting
- Backups: Automated daily backups with geo-redundancy
Security Testing
- Penetration Testing: Annual third-party penetration tests
- Vulnerability Scanning: Automated daily scans with remediation SLAs
- Code Review: Security-focused code reviews for all changes
- Bug Bounty: Responsible disclosure program for researchers
Incident Response
- Incident Response Plan: Documented procedures for all incident types
- 24/7 On-Call: Security team available around the clock
- Breach Notification: Customers notified within 72 hours
- Post-Mortems: Root cause analysis and corrective actions
Employee Security
- Background Checks: All employees undergo background screening
- Security Training: Mandatory annual security awareness training
- Confidentiality: All employees sign NDAs
- Device Security: Full-disk encryption, MDM, and remote wipe
Responsible Disclosure
Found a security vulnerability? We appreciate responsible disclosure from security researchers.
Report vulnerabilities to security@outersec.com with:
- Detailed description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Proof-of-concept (if applicable)
We commit to acknowledging reports within 24 hours and providing a resolution timeline within 72 hours.
Questions About Our Security?
Contact our security team or start your free 14-day trial.