

We follow security best practices and leverage the robust compliance frameworks of our cloud infrastructure providers. Our approach aligns with the UK National Cyber Security Centre's Cloud Security Principles for cloud service providers.
Our application is built on top of ISO 27001 certified cloud infrastructure. We carefully select providers who maintain the highest security standards:
| Certification | ||
|---|---|---|
| ISO 27001 | On Request | On Request |
| SOC 2 Type II | On Request | On Request |
| SOC 3 | On Request | Public |
Some of our providers require NDAs or registration to access detailed compliance documentation. If you need specific compliance reports or certifications for security review purposes, please email [email protected] and we'll guide you through the process.
Responsibility is shared between the cloud provider and the customer, in the Cloud Security Shared Responsibility Model.
Our security approach is aligned with the principles published by the National Cyber Security Centre (NCSC):
We leverage our providers' robust security controls while implementing additional application-level protections to ensure comprehensive security coverage.
For detailed information about our security practices, please review our Security Policy or contact our team.