Skip to main content
Submit a request
This is where we outline our security practices and procedures.
Audit and Certification
How do you maintain current security practices?
How long do you keep data and what happens when it is deleted?
What are your encryption methods?
Authentication and Authorization
What are your authentication and authorization policies and procedures?
How do you monitor security threats?
Do you employ penetration testing?
Do you perform static code analysis?
What dynamic vulnerability measures are in place?
What physical security measures are in place?
How do you handle endpoint security
What is your network security plan?
What security training is provided to employees?
What screening is completed on Certn employees?