Stormboard highly values the security and privacy of each of our users and team members.
We have implemented top tier security companies and practices in order to ensure that everything security related within our software is taken care of and regularly maintained.
Below is an overview of our security practices, including what we use to keep data private and secure.
Stormboard uses AWS (Amazon Web Services), which is one of the most trusted Cloud Security services, to keep all data safe. Our users’ security is our top priority, which is why we went with a well-known and proven Cloud Security service.
According to the AWS website, the main benefits of their service include:
Keep Your Data Safe
Meet Compliance Requirements
For more information, AWS provides a guide to their services here: https://aws.amazon.com/security/ .
Strong Data Encryption:
All data transfer to and from our Cloud services is encrypted with Transport Layer Security (TLS). Stormboard's implementation of TLS uses strong ciphers and protocols by default.
Data is encrypted at rest according to the level of your team's subscription. If you'd like to talk more about encryption or your company's data management requirements, we're here to help .
Access to Stormboard’s systems, and your data, is restricted to only those who need access in order to provide you with the best support possible.
Other security measures include:
Background checks for our employees
Signed confidentiality agreements
Termination/access removal processes
Acceptable use agreements
Security is the responsibility of everyone who works at Stormboard, and it is taken seriously.
We train all of our employees so that they can identify security risks, and are empowered to take action if necessary.
Security & Penetration Testing:
The Stormboard Team performs thorough internal quality assurance testing. We also annually (at minimum) contract certified security professionals to conduct an extensive security audit (penetration test and web application vulnerability tests) of Stormboard.
If you find a vulnerability in one of our services, please report it to firstname.lastname@example.org .
An integral part of the information security program, Stormboard conducts thorough and timely risk assessments. These assessments examine any potential threats and vulnerabilities to the confidentiality, integrity, and availability of Customer Data that is stored, transmitted, and/or processed for its Customers.
We then develop strategies to efficiently and effectively mitigate the risks identified in the assessment process.
Any security related incidents such as data breaches, compliance issues, or any other complaint or concern should be reported immediately to email@example.com .
All incidents are tracked by operations management until resolved, and closed incidents are reviewed by operations personnel for appropriate resolution.
We’re committed to protecting your privacy and intellectual property. Your privacy is important to us, all data collected and stored follows GDPR compliance.
If you have any questions regarding Stormboard’s Cloud Security platform, don’t hesitate to contact us for more information. We also provide information about our security features on our Trust & Security webpage (https://stormboard.com/trust ).