● Information Security Program
● Third-Party Audits
● Third-Party Penetration Testing
● Roles and Responsibilities
● Security Awareness Training
● Confidentiality
● Background Checks
We perform background checks on all new team members in accordance with local laws.Cloud Infrastructure Security
Data Hosting Security
Encryption at Rest
Encryption in Transit
Vulnerability Scanning
Logging and Monitoring
Business Continuity and Disaster Recovery
Incident Response
Permissions and Authentication
Least Privilege Access Control
Quarterly Access Reviews
Password Requirements
Password Managers
Annual Risk Assessments
Vendor Risk Management
If you have any questions, comments, or concerns or if you wish to report a potential security issue, please contact security@finzly.com