Security Policy

Last modified:

July 14, 2025

Security at Alignd

At Alignd, security is foundational to how we build, operate, and grow. We take a holistic approach to protecting customer data—through secure infrastructure, responsible processes, and continuous monitoring. Below are the key areas where we’ve focused our time and continue to evolve.

SOC 2 Compliance

We are proud to have achieved SOC 2 Type I compliance, demonstrating that our controls and security processes have been formally audited and meet the industry standard for safeguarding data. We are currently undergoing the process to attain SOC 2 Type II, which will validate the operational effectiveness of these controls over time.

Additionally, our hosting provider Render is independently certified for SOC 2 Type II, ISO 27001, and is GDPR/DPA-compliant, further strengthening our infrastructure-level security.

Secure Infrastructure

Alignd’s platform is built from the ground up with security in mind. We continuously monitor and validate our infrastructure to ensure we meet strict reliability and security standards.

Encryption

All sensitive data is encrypted both in transit and at rest using industry standards. We use AES-256 encryption for stored data and TLS 1.2+ for secure transmission. Our platform has earned an A+ rating from SSL Labs for TLS configuration.

Continuous Security & IT Controls

We maintain a continuous security posture throughout the development lifecycle:

  • Rigorous source code reviews

  • Automated vulnerability scanning of code, libraries, and infrastructure

  • Continuous monitoring of all cloud assets and providers

  • Regular review of internal IT controls, including access policies and audit logs

Vulnerability Disclosure

Alignd leverages Render’s private vulnerability disclosure program in partnership with HackerOne. Security reports are triaged by HackerOne and escalated as needed, helping us stay ahead of emerging threats.

DDoS Protection

Our platform is protected from distributed denial-of-service attacks through Render’s integration with Cloudflare, whose global network blocks over 117 billion threats daily.

Penetration Testing

Render undergoes annual third-party penetration testing by top-tier independent firms. These tests include both application-level and infrastructure-level assessments.

Built-in Security Features

We offer customers several features to further enhance their security posture:

  • Multi-factor authentication (MFA)

  • Private URLs for access control

  • Automatic HTTPS redirection to ensure secure traffic

Physical Security

Through Render and its partnered cloud providers, Alignd benefits from enterprise-grade physical security controls in globally distributed data centers. All vendors are vetted for their adherence to robust physical and virtual security standards.

Compliance Support

We understand that compliance is a critical part of earning customer trust. To support your own compliance requirements, we provide SOC 2 Type I reports and are progressing toward Type II certification. Please contact support@alignd.team to request standard agreements or discuss specific compliance needs.