SOC 2 Type II Certified

Enterprise-Grade Security & Compliance

Security and compliance are foundational to everything we build. Your data and your customers' data are protected with bank-level encryption, continuous monitoring, and industry-leading certifications.

Compliance Certifications

Independently audited and certified to meet the highest standards

SOC 2 Type II

Independently audited controls for security, availability, and confidentiality

ISO 27001

International standard for information security management

GDPR Compliant

Full compliance with EU data protection regulations

PCI DSS

Compliant payment processing via Stripe (Level 1 PCI)

Audit reports available under NDA for enterprise customers

Security Infrastructure

How we protect your data at every layer

Encryption

  • TLS 1.3 for all data in transit with perfect forward secrecy
  • AES-256 encryption for all data at rest in databases and storage
  • Encrypted backups with automatic 30-day retention
  • Hardware security modules (HSM) for key management

Infrastructure

  • Multi-region deployment across US and EU for redundancy
  • DDoS protection via Cloud Armor with 99.99% SLA
  • Automated daily backups with point-in-time recovery
  • Private VPC with network isolation and firewall rules

Monitoring & Detection

  • 24/7 security monitoring with real-time threat detection
  • Automated intrusion detection and prevention systems (IDS/IPS)
  • Comprehensive audit logs for all system and user activity
  • Anomaly detection using machine learning for fraud prevention

Access Controls

  • Multi-factor authentication (MFA) required for all team members
  • Role-based access control (RBAC) with least-privilege principles
  • IP allowlisting and VPN requirements for production access
  • Regular access reviews and automatic deprovisioning

Data Privacy & Protection

Your data is yours. Here's how we protect it.

Data Residency

Customer data stored in your chosen region (US, EU, or APAC) and never leaves that geography without explicit consent.

Data Minimization

We only collect and retain data necessary for providing insurance services. Automatic purging of unnecessary data after retention periods.

Data Portability

Export all your data at any time via API or dashboard in standard formats (JSON, CSV). No lock-in.

Right to Deletion

GDPR and CCPA compliant deletion workflows. Delete customer data with a single API call (subject to legal retention requirements).

Data Processing Agreements

Standard DPA available for all customers. Custom DPAs and BAAs for enterprise healthcare customers.

Privacy Shield Certified

Standard Contractual Clauses (SCCs) for EU-US data transfers. Full GDPR compliance with appointed DPO.

Continuous Security Testing

Regular assessments to identify and fix vulnerabilities

Annual Penetration Testing

Independent third-party penetration tests conducted annually by certified ethical hackers. Reports shared with enterprise customers under NDA.

Last: Dec 2024

Automated Vulnerability Scanning

Daily automated scans for known vulnerabilities in dependencies, containers, and infrastructure. Automatic patching for critical vulnerabilities within 24 hours.

Daily

Bug Bounty Program

Public bug bounty program via HackerOne. Rewards up to $10,000 for critical vulnerabilities. Responsible disclosure encouraged.

Active

Code Security Reviews

Automated SAST/DAST scanning on every pull request. Manual security reviews for high-risk changes. Security-focused code training for all engineers.

Every PR

Incident Response

How we handle security incidents

1

Detection & Triage

Automated monitoring detects anomalies. Security team triages within 15 minutes. Severity classification and escalation.

2

Containment

Immediate isolation of affected systems. Automated rollback procedures. Minimize blast radius.

3

Investigation & Remediation

Forensic analysis to determine root cause. Deploy fixes and patches. Verify resolution.

4

Communication

Notify affected customers within 72 hours. Status page updates. Transparent post-mortem reports.

5

Post-Incident Review

Blameless post-mortem. Document lessons learned. Implement preventive measures.

Security Contact: Report security vulnerabilities to security@coverkit.io. We respond within 24 hours and provide updates every 48 hours until resolved.

Need More Information?

Access our Trust Center for detailed security documentation, compliance certificates, and audit reports.