FYI has achieved its SOC 2 Type 2 certification and is audited annually. Please contact email@example.com for FYI’s latest SOC 2 report.
FYI is currently undergoing its International Organization for Standardization’s (ISO) information security standard 27001 certification.
We are GDPR compliant as a data processor. For more information, visit https://usefyi.com/gdpr-faq/.
FYI hosts all data utilizing industry-leading US-based Amazon Web Services (AWS) facilities, which include 24/7 on-site physical security and camera surveillance. For additional details regarding AWS security, visit https://aws.amazon.com/security/.
Data submitted to FYI by authorized users is considered confidential. All data sent to or from FYI infrastructure is encrypted in transit using Transport Layer Security (TLS) v1.2. All data is encrypted at rest using military-grade AES-256 encryption. High risk data have multiple levels of encryption applied.
FYI infrastructure is continually monitored for security vulnerabilities and updates applied automatically.
The following policies are followed and enforced at FYI:
Acceptable Use Policy, Asset Management Policy, Backup Policy, Change Management Policy, Code of Conduct, Cryptography Policy, Data Classification Policy, Data Deletion Policy, Data Protection Policy, Incident Response Plan, Information Security Policy, Password Policy, Physical Security Policy, Responsible Disclosure Policy, Risk Assessment Program, System Access Control Policy, Vendor Management Policy, Vulnerability Management Policy.
These policies are followed by all FYI employees, who review and accept the policies a minimum of once per year.
FYI uses a number of third party applications and services to support the delivery of our products to our customers. FYI's Security team has established a vendor management program that sets forth the requirements for FYI to engage with third party service providers. For a complete list of FYI's third party service providers, visit https://usefyi.com/third-party-infrastructure/
FYI requires all employees and contractors to sign a confidentiality agreement prior to their start date.
During FYI's onboarding process, all new hires are required to complete a security awareness training. All employees and contractors continue to take a security awareness training annually.
FYI's engineering team gets additional training focused on design patterns and the technical aspects of FYI infrastructure security. As an added layer of diligence, every code change is evaluated from a security perspective.
Access to customer data is limited to functions that have a business requirement to do so.
Employees are required to use a VPN to access AWS resources, and all servers and databases are inside of VPC with minimum access policies. Access to customer data requires authentication and authorization controls, including Multi-Factor Authentication (MFA). FYI has implemented controls to ensure the integrity and confidentiality of administrative credentials and access mechanisms.
FYI employees are given minimum access to customer data based on their responsibilities. All employee access to systems is logged and audited for security purposes.
FYI runs automated container and application security scans on a daily basis, and package dependency security advisory scans on a weekly basis. In addition, FYI undergoes penetration testing by a third party at least annually. We also maintain separate production and testing environments.