blo-decor

Security & Privacy

Document Crunch is proud to maintain a SOC 2 Type II attestation
Our SOC 2 Type II report is available at our Trust Center

Our Product Security

Penetration Testing

Penetration Testing

Document Crunch has at least yearly third-party vulnerability and penetration testing and promptly remediates all findings according to their severity, as specified in our policies.

18

Data Protection

  • Data
    At Rest
    At Document Crunch, we take the security of your data seriously. All datastores containing customer information, along with our S3 buckets, are encrypted at rest. We use the robust AES 256 encryption method to ensure your data is safe and secure at all times.
  • Data
    In Transit
    Document Crunch ensures your data stays safe! We use TLS 1.2 or higher to protect data whenever it’s sent over networks that might not be fully secure. Plus, our server TLS keys and certificates are expertly managed by AWS and smoothly deployed through Application Load Balancers, keeping your information well-protected at all times.
  • Secrets Management Document Crunch uses the AWS Key Management System (KMS) for encryption key management. This system securely houses key materials in Hardware Security Modules (HSMs), preventing direct access to anyone, including our own and Amazon’s staff. These keys, stored in HSMs, facilitate encryption and decryption through Amazon’s KMS APIs.
  • App Secrets Management For the secure handling of application secrets, we utilize AWS Secrets Manager and Parameter Store. These secrets are encrypted and stored with stringent access restrictions in place to ensure their security.  Keys to critical infrastructure are rotated quarterly.

Enterprise Security

All Document Crunch employees and contractors undergo annual security awareness training, and our developers receive additional in-depth training in secure coding practices.

Document Crunch uses a risk-based approach to vendor security. When determining the risk rating of a vendor, we consider factors such as their access to customer and corporate data and the character of their integration with our production environment. The security of each vendor is evaluated in order to determine a risk rating for the vendor and whether that vendor is approved.

Document Crunch performs background checks on employees when they are hired, in accordance with local laws and regulations.

Document Crunch maintains codes of conduct and confidentiality agreements that all our employees and contractors acknowledge and accept.