CloudCheckr Data Security Practices
At CloudCheckr, keeping client data secure is our first priority.
We have instituted an extensive system of robust security practices to ensure your data security.
You Can Be Confident In Our Reliability.
CloudCheckr is teamed with both AWS and Microsoft. We are an official Amazon Web Services APN Advanced Technology Partner and an official Microsoft BizSpark Network Partner. We are the only service provided in our class certified for full AWS GovCloud access.
We Always Encrypt Data.
All information that we receive and transmit is fully encrypted. We are committed to using the most advanced encryption techniques to ensure that you are as protected as possible.
We Employ Strict Access Controls.
We employ significant controls to ensure your data remains secure. CloudCheckr actively employs a policy of least provisioning, where employees are only granted the minimum system access to perform their assigned job function. CloudCheckr employees cannot decrypt encrypted account data.
We Employ Secure Data Centers.
CloudCheckr stores its data in AWS and Microsoft Azure data centers. All of the data centers have achieved ISO/IEC 27001 certification, PCI DSS Level 1 compliance. Learn more about AWS and Microsoft Azure security measures.
We Employ an Active Vulnerability Reporting Program.
CloudCheckr believes it is essential to investigate all potential vulnerabilities. We have clearly defined procedures to fully investigate all reported issues. Please click here for more information.
We Function in HIPAA Sensitive Environments.
CloudCheckr data security fulfills the sufficiency requirements for use by healthcare providers in HIPAA sensitive environments. For more information, email us at firstname.lastname@example.org.
We are SOC 2 Compliant.
We are serious about security and compliance. CloudCheckr has successfully completed our SOC 2 Type 2 audit. We use advanced security controls to prevent a data breach and provide uninterrupted service, plus now you can more easily satisfy your auditors compliance demands by around SOC 2. For more information, please email us at email@example.com.
We know that you count upon us to keep your data secure, and we take our responsibility very seriously.
If you’d like more detail about our security, please refer to our Data Security Statement or email us at firstname.lastname@example.org. We would be happy to provide greater detail and insight into our policies and procedures.