Data Security & Compliance

SOC 2 Type 2 Certification

fullthrottle.ai® delivers a SOC 2 compliant platform, following the SOC 2 principles of Privacy, Security, Availability, Processing Integrity, and Confidentiality.  

SOC 2 (Service and Organization Controls 2) is a set of security and privacy standards that organizations can follow to demonstrate their commitment to protecting sensitive customer data. The SOC 2 standards are published by the American Institute of Certified Public Accountants (AICPA).

Request the SOC 2 Report

What you get with fullthrottle.ai®

Culture of Security

Proactive Security

Proactive Security Posture & Monitoring of National/Global Tech Security Events

  • Traffic Monitoring via Active WAF ACLs etc
  • Perimeter Monitoring – AWS GuardDuty, CloudWatch etc
  • Data Security Review Committee
  • Risk Management Review Meetings
  • Bi-Monthly Leadership SecOps Review Meetings
  • Defined Incident Response Teams and Procedures
  • External Independent Penetration Tests

Attestation and Team Awareness

  • NIST Based Controls
  • Phishing and Other Credential Breach Awareness Training
  • OWASP Code Development Standards Applied
  • Automated Application Credential Rotation and File Handling Standards
Attestation and Team Awareness
Access Control

Access Control

  • Principle of Least Privilege
  • Infrastructure Access Behind 2FA
  • Password Policies and Rotation
  • Role-Based User Access
  • User System Access Audits
  • User System Permission Audits

What you get with fullthrottle.ai®

Key Security Principles Applied

Infrastructure Security
  • Logical Network Separation
  • Restricted Ports
  • Appropriate IP restrictions
  • Lightweight Server Configurations
  • Approved File Extension Control on Application Servers
Data Security
  • Data Encryption at Rest and In Flight
  • Data Classification and Handling Policy and Procedures
  • Monthly Data Classification Audit
  • Privacy Data Classification and Handling
Availability
  • Daily (continual) Process Capacity and Availability Monitoring
  • Backup Schedules
  • Maintain Recovery Infrastructure
  • Quarterly Disaster Recovery Testing
Process Monitoring

Infrastructure, user event logging, and user access audits. Weekly as well as monthly infrastructure monitoring.

Data Retention & Remediation

  • Active client data is retained for 7 years, then archived or deleted automatically.
  • Inactive client data is deleted or archived after 24 months of inactivity, records are kept for audits and compliance, unless otherwise directed.
  • Automated processes manage data deletion and archiving monthly.
Data Retention & Remediation

Building trust & peace of mind for our partners

trust and peace of mind

Compliance requirements & cost savings

Improved security posture & internal processes

Frequently Asked Questions