- SOC 2 Type II
The SOC 2 (System and Organization Controls) Type II report focuses on the security, availability, and confidentiality of a cloud service and is audited annually at Digital Onboarding.
- Data Security
- Data Encrypted At-Rest
Digital Onboarding utilizes technologies or methodologies that make client data unusable, unreadable, or indecipherable to unauthorized individuals, including mechanisms to encrypt client data at-rest whenever possible.
- Data Encrypted In-Transit
Digital Onboarding utilizes technologies or methodologies that make client data unusable, unreadable, or indecipherable to unauthorized individuals, including mechanisms to encrypt client data in-transit whenever possible.
- Data Retention Policy
Digital Onboarding has a data retention policy defining where and for how long data is stored or archived.
1 more topic
- Incident Management & Response
- Incident Response Plan (IRP)
Digital Onboarding implements policies and procedures to address the handling of security incidents. A security incident is an attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
- Availability & Reliability
- Auto Scaling
Digital Onboarding's computing resources, such as server capacities and virtual machines are dynamically allocated based on demand.
- Quality Assurance Testing
The change management process has been established to provide a layer of protection for the Company by ensuring that every change performed is thoroughly discussed and is approved prior to migration to production.
1 more topic
- Organizational Security
- Confidentiality Agreements
All personnel required to sign a confidentiality agreement prior to onboarding.
- Employee Background Checks
Digital Onboarding performs background checks on all employees as part of its hiring process.
5 more topics
- Business Continuity
- Business Continuity Plan
Digital Onboarding maintains plans for business continuity.
- Disaster Recovery Plan
Recognizing the need for responding to an emergency or a natural/made threat that damages systems that contain client data, Digital Onboarding maintains plans for disaster recovery.
1 more topic
- Threat Management
- Vulnerability Scanning
Digital Onboarding has implemented a vulnerability management process that is focused on mitigat- ing and remediating the risks associated with the software and hardware used in their infrastructure. Digital Onboarding takes these risks seriously as they could have a significant negative impact on business assets.
The Digital Onboarding platform forces secure sessions and provides customer-specific login policies. The platform is built on application security development best practice (OWASP) that prevents the following vulnerabilities: weak server-side controls, insecure data storage, insufficient transport layer protection, unintended data leakage, broken cryptography, client- side injection, security decisions via untrusted inputs, improper session handling, and lack of binary protections.
Sign up to see the rest of Digital Onboarding's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.