Stomio

Security & Compliance

Security built in. No shortcuts.

Stomio encrypts all data in transit and at rest, enforces strict access controls, and has maintained SOC 2 compliance since 2022.

Security measures

Encryption in Transit & at Rest

All data is encrypted across networks and databases. Multi-layer database security with encrypted passwords and firewalls.

OAuth2 Authorization

Integration authorization via OAuth2. We never store third-party credentials.

Periodic Penetration Testing

Third-party penetration testing conducted at least annually to identify and remediate vulnerabilities.

Multi-Region Backup

Data backup across multiple regions with 24-hour RTO/RPO maximums.

Infrastructure as Code

Infrastructure managed as code with peer-reviewed changes. Isolated development, staging, and production environments.

Role-Based Access Control

Strict role-based access restrictions for all personnel. Web Application Firewall on all public endpoints.

Device Monitoring

Employee device monitoring with encrypted disks and antivirus protection enforced across all devices.

Strong Password Requirements

Strong password requirements and disk encryption enforced. Compliance with industry security standards.

Platform integrations

Stomio integrates with leading enterprise tools, all secured via authorized OAuth flows.

JiraOktaZapierZoomSlack

Security questions?

For security-related inquiries or to request our full security documentation, reach out directly.

hello@stomio.io