EdgeBit has a current SOC 2 Type II compliance report.
Security policies described below follows the criteria set forth by the SOC 2 Framework.
EdgeBit is hosted using cloud services from AWS and Google, and follows their best practices for security and availability.
EdgeBit carefully manages application dependencies to reduce supply chain risk. Application architecture is selected to be secure by default with defense in depth.
EdgeBit's response policy includes escalation procedures, rapid mitigation and customer communication.
EdgeBit uses SSO backed by MFA whenever possible. We think it’s so important that it’s included for every EdgeBit customer without charge.
Security is paramount to EdgeBit in both our hosted software and the open source projects that we produce. We’re extremely grateful for responsible security researchers that report vulnerabilities to us.
Security researchers can contact EdgeBit security engineering at firstname.lastname@example.org with the full details, including steps to reproduce the issue.Report a Vulnerability
If you are reporting an issue that you believe needs urgent attention, please include
[URGENT] in your email subject (including the brackets).