Security

Security and Privacy at Start Securely

At Start Securely, security forms the cornerstone of our operations. We are committed to upholding the highest standards of security and privacy, ensuring the protection of our customers’ sensitive data and the integrity of our platform.

Explore More

Governance

Security and Privacy Assurance at Start Securely

Our Security and Privacy teams at Start Securely are committed to implementing rigorous policies and controls, continuously monitoring compliance with these measures, and furnishing evidence of our security and compliance to third-party auditors.

  • Restricted Access

    Access should be restricted to individuals with a genuine business requirement and provided according to the principle of least privilege.

  • Controls

    Security controls must be deployed and layered in accordance with the principle of defense-in-depth.

  • Enterprise Security

    Security controls must be consistently applied across all areas of the enterprise to ensure comprehensive protection against potential threats and vulnerabilities.

  • Iterative Approach

    The implementation of controls should follow an iterative approach, continuously evolving to enhance effectiveness, increase auditability, and reduce friction across all operational dimensions.

Data Privacy

Privacy Shield

Start Securely maintains an active Privacy Shield membership.

Regulatory compliance

Start Securely evaluates updates to regulatory and emerging frameworks continuously to evolve our program.

Privacy Policy and DPA

View Start Securely’s Privacy Policy
View our list of subprocessors
View our DPA

Protection Method

Data at rest

Data at rest, including customer data in datastores and S3 buckets, is encrypted. Additionally, sensitive collections and tables utilize row-level encryption.

Data in transit

Start Securely uses TLS 1.2 or higher for secure data transmission and implements HSTS for enhanced security during transit. TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret management

Lorem, ipsum dolor sit amet consectetur adipisicing elit. Modi possimus excepturi eligendi at aspernatur temporibus tempore voluptas omnis distinctio atque.

Testimonials

What People Say

Product Security

Penetration testing

Start Securely conducts regular penetration testing conducted by independent third-party security firms to identify and address potential vulnerabilities in our systems and infrastructure. This helps ensure that our security measures are robust and effective in protecting our systems and data against potential threats.

Enterprise Security

Start Securely prioritizes enterprise security

by implementing rigorous security measures and best practices across all levels of our organization.

  • Endpoint protection

    Start Securely enforces strict security standards and MDM to shield corporate devices from threats.

  • Secure remote access

    Employs Tailscale VPN and malware-blocking DNS for enhanced remote access security.

  • Security education

    Offers detailed security training, including live onboarding sessions for new hires.

  • Identity and access management

    Uses Okta for identity management, prioritizing phishing-resistant authentication with WebAuthn.