Security First.
Trust by Design.

We take the protection of your data seriously. #divisions employs industry-leading security practices, rigorous compliance standards, and transparent processes to safeguard your infrastructure.

SOC 2 Type II
Certified 2024
ISO 27001
Certified 2024
GDPR Compliant
Data Processing Addendum
HIPAA BAA
Available for Enterprise

How We Protect Your Data

Our security framework is built on defense-in-depth, zero-trust architecture, and continuous monitoring.

🔐

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Encryption keys are managed via AWS KMS with automatic rotation and strict access controls.

🔑

Access Control

We enforce Multi-Factor Authentication (MFA) for all users. Internal access follows the Principle of Least Privilege (PoLP) with role-based access control (RBAC) and just-in-time provisioning.

📊

Continuous Monitoring

Our Security Operations Center (SOC) monitors infrastructure 24/7. We use automated threat detection, anomaly analysis, and immediate alerting for suspicious activities.

🛡️

Vulnerability Management

We perform regular penetration testing by third-party experts and run automated vulnerability scans on all codebases and infrastructure daily. Critical issues are patched within 24 hours.

🏗️

Infrastructure Security

Hosted on AWS with dedicated VPCs, private subnets, and network isolation. We utilize WAF, DDoS protection, and immutable infrastructure patterns to prevent tampering.

🔄

Backup & Recovery

Automated encrypted backups are stored in geographically redundant regions. We conduct regular disaster recovery drills to ensure an RTO of < 1 hour and RPO of < 5 minutes.

Secure by Design

Every request is validated, authenticated, and encrypted before reaching your data.

Data Flow Pipeline
Client App
TLS 1.3
WAF / CDN
DDoS Protection
API Gateway
Auth & Rate Limit
Microservices
Zero Trust mTLS
Encrypted DB
AES-256 / KMS

Incident Response Plan

We maintain a rigorous incident response protocol aligned with NIST and ISO standards. In the event of a security incident, transparency and speed are our priorities.

Contact Security Team

1. Detection & Triage

Automated systems detect anomalies. The Security Team assesses severity and initiates response within 15 minutes.

2. Containment

Immediate isolation of affected systems. Automated scripts block malicious IPs and revoke compromised credentials.

3. Investigation

Forensic analysis to determine root cause, scope, and impact. We engage third-party experts for independent validation.

4. Remediation & Recovery

Patching vulnerabilities, restoring clean backups, and verifying system integrity before bringing services back online.

5. Notification

Affected customers are notified within 24-72 hours depending on severity. A post-mortem report is shared publicly.

Found a Vulnerability?

We encourage responsible disclosure. If you believe you've found a security issue, please report it immediately. We reward valid reports through our Bug Bounty program.

Report Vulnerability →
$10k+
Avg. Bounty Reward
< 48h
Avg. Response Time
100%
Reports Resolved

Security Questions

Where is my data hosted? +
#divisions hosts data on AWS infrastructure. By default, data is stored in US-East regions. Enterprise customers can select specific data residency regions including EU-WEST and AP-SOUTH. All data remains under your control and can be exported at any time.
Do you share data with third parties? +
No. We never sell or share your data with third parties. We only use service providers strictly necessary for our operations (e.g., hosting, analytics), and they are bound by strict data processing agreements.
Can I perform a security audit? +
Yes. Enterprise customers can request a copy of our SOC 2 Type II report and ISO certifications. We are also open to third-party penetration testing under a coordinated disclosure policy.
How do you handle data deletion? +
You can request data deletion at any time. Upon request, we permanently erase your data from all active and backup systems within 30 days, in compliance with GDPR "Right to be Forgotten" requirements. We provide a confirmation certificate upon completion.