Autograph Trust Center

Autograph Trust Center

Autograph is committed to protecting the data of our customers and employees. We began laying our security and compliance foundations from our earliest days.

Certifications

Autograph adheres to industry-standard compliance frameworks, including SOC 2 Type II, GDPR, and CCPA. This ensures that our internal controls and processes meet and exceed industry practices in security & reliability.

Resources

Information Security Policy

SOC-2 Type I Report

SOC-2 Type II In-Progress Letter

Most Recent Pentest Report (Aug 2024)

Production Network Diagram

Request Documentation

Every member of our workforce prioritizes security
Autograph fosters a robust security-focused environment, equipping all staff members with necessary training, resources, and tools to operate securely. Every employee is required to adhere to Autograph's internal guidelines and protocols regarding the confidentiality of client information.

Security is fundamental to our culture and process
The way we build incorporates security measures from the outset, ensuring that our products, procedures, and practices surpass industry standards.

Encryption protects your data when you use Autograph
We implement cutting-edge encryption protocols to safeguard your information. Our infrastructure uses AES-256 at rest and TLS 1.3 in transit to encrypt and safeguard your data.

We are built on secure cloud infrastructure
We leverage secure cloud infrastructure Autograph operates on AWS' industry-leading cloud platform, benefiting from years of security enhancements to guarantee optimal performance, resilience, and rapid deployment.

Continuous monitoring and regular testing to protect data
Autograph's infrastructure is continuously monitored using industry-leading intrusion detection systems. Security consultants conduct penetration testing at least every year, and our internal team conducts an automated scan on a weekly basis.

Adherence to global data and security standards
Autograph complies with SOC 2, GDPR, and CCPA regulations. The SOC 2 certification is an independent audit report providing information and assurance about Autograph's control measures.

Security at Autograph

Whitepaper

Q3 2024

Sub-processors

Amazon Web Services

Autograph uses AWS for cloud hosting of databases.

Render

Autograph uses Render for servers & frontend deployment.

Synadia

Autograph uses Synadia to manage NATS (data streaming).

Prisma

Autograph uses Prisma to manage database workflows & object-relational mapping.

Finch

Autograph uses Finch to power payroll & HRIS integrations.

Oneschema

Autograph uses OneSchema for validating & processing spreadsheet imports.

FAQ

How does Autograph comply with SOC-2?
What level of access does Autograph need to connect key systems?
Does Autograph conduct penetration testing?
How does Autograph use AI within the product?
How does Autograph comply with GDPR?
How does Autograph comply with CCPA?
How does Autograph comply with SOC-2?
What level of access does Autograph need to connect key systems?
Does Autograph conduct penetration testing?
How does Autograph use AI within the product?
How does Autograph comply with GDPR?
How does Autograph comply with CCPA?
How does Autograph comply with SOC-2?
What level of access does Autograph need to connect key systems?
Does Autograph conduct penetration testing?
How does Autograph use AI within the product?
How does Autograph comply with GDPR?
How does Autograph comply with CCPA?