Enterprise-grade security & compliance
Gridly maintains a secure and dependable platform to allow your teams work confidently with sensitive content and data.
Certification & Principles
- ISO/IEC 27001:2022 – Certified Information Security Management System (ISMS). Download
- Defense in Depth – Layered safeguards across applications, networks, and infrastructure.
- AWS Well-Architected Security Pillar – Cloud environments designed following industry-leading security principles.
- Security & Privacy by Design – Built into every stage of our product lifecycle.
Application security
Code Review Process
Peer code reviews to catch security issues before deployment, supporting safe and reliable software releases.
Secure Software Development Lifecycle
Security is embedded throughout the development process, from design to deployment.
Vulnerability Scanning
Quarterly scans using AWS Inspector are performed to identify and remediate security weaknesses. Regular testing with BurpSuite and ZAP. Automated monitoring via AWS Security Hub, CloudTrail, and AWS Config.
Web Application Firewall
Layered protection using AWS and open-source technologies is implemented to block malicious traffic and defend against threats such as SQL injection and cross-site scripting (XSS).
Employee Disclosure Process
Onboarding procedures include NDAs and background checks to help safeguard sensitive information.
Data security & protection
Daily Database Backups
Robust data backup and recovery mechanisms are implemented to ensure data integrity and availability.
Application-Level Backups
Customers can initiate on-demand backups and restores at any time through Gridly’s application features
Infrastructure-Level Backups
Automated point-in-time backups and restores are performed using AWS RDS, ensuring continuous data protection and rapid recovery capabilities.
Encryption at Rest
AES-256 for encryption at rest with AWS KMS is used and cryptographic keys are assigned to specific roles based on least privilege access and keys are automatically rotated yearly. Usage of keys is monitored and logged.
Security Policies
Security policies, including Information Security and Access Control to guide Gridly team to manage risks and protect customer data, meeting ISO 27001 standards.
SSL/TLS Enforced
Gridly uses TLS v1.2 or higher for all data transfers, with regularly updated certificates to ensure secure connections.
System Access Control Policy
Gridly limits system access to only what’s needed, using role-based controls RBAC and regular audits to prevent unauthorized access.
Infrastructure security
Restricted Cloud Data Storage
Production data stored in secure AWS regions, encrypted with AES-256 and accessible only by authorized staff.
Encrypted Admin Access
TLS v1.2+ applied to web-based admin access, with multi-factor authentication (MFA) required for additional protection.
Multiple Availability Zones
Deployment across AWS multiple availability zones to support service continuity and data resilience during disruptions.
Password Policy and Configuration
Enforced use of strong, unique passwords, regularly updated and securely stored using hashing.
Automatic Security Patching
Security patches automatically applied through AWS and Docker containers to maintain protected systems.
Network security
No Public SSH Access
Public SSH access blocked. Secure VPN server connections required across all environments.
Firewall Protection
AWS Security Groups and Network ACLs applied to control network traffic and block unauthorized access.
Infrastructure Activity Logging
AWS CloudTrail used to log, monitor, and retain account activity across the AWS infrastructure.
Configuration Monitoring
AWS Config applied for continuous monitoring, auditing, and evaluation of AWS configurations.
System Monitoring & Error Tracking
In-house gateway, error tracking, and logging services based on Nginx, Sentry, and Grafana Loki to monitor performance, requests, and security-related events.
External Traffic Monitoring
Automated monitoring of external-facing networks to detect malicious traffic.
API Gateway Protection
Prevention layer within the API gateway to terminate malicious requests before they reach microservices.
Security Alerts & Notifications
Security notifications routed to responsible employees for timely response.
Unique User Accounts
Unique accounts assigned to every user to ensure traceability and secure access.
Malware Detection
Malware detection software installed to support system protection.
Organization Security
Acceptable Use Policy
Acceptable Use Policy enforced through employee training and formal acknowledgment, defining permitted use of systems and data.
Business Continuity & Disaster Recovery Testing
Annual testing of business continuity and disaster recovery plans to support operational resilience.
Code of Conduct
Code of Conduct outlining employee security and ethical responsibilities.
Disaster Recovery Plan
Documented disaster recovery plan defining procedures and recovery objectives to restore services after disruptions.
Incident Response Team
Dedicated team with defined roles to respond to security incidents.
Documented Incident Response Procedures
Internal procedures documented for handling production incidents.
Customer Incident Notification
Customers notified in the event of security issues through direct email communication.
Public Status Updates
Detailed updates shared on the online status page, including current status and progress.
Remediation Timeline Transparency
Clear information provided on when patches will be applied and the expected timeframe for resolution.
Security Training
Annual security awareness training for all employees. Development team receives additional regular training on OWASP Top 10 vulnerabilities to support secure coding practices.
Product Security
Database & Server Monitoring
Production databases and servers monitored using AWS and open-source tools (Grafana, Prometheus, Exporter), with alerts for suspicious activity and resource usage spikes.
Hard-Disk Encryption
All hard disks encrypted with AES-256 to protect data at rest. The production database layer (AWS RDS) encrypted with AES-256 via AWS KMS.
Multi-Factor Authentication (MFA)
MFA required for all accounts to add an extra layer of security.
Session Lock Controls
Inactive sessions automatically locked to help prevent unauthorized access.
Terms of Service
Clear Terms of Service defining responsibilities and acceptable platform use to support compliance with security standards.
Sub-processors
Gridly works with the following subprocessors to provide and support the Service. Each subprocessor processes data only on Gridly’s documented instructions and under a data processing agreement.
| Sub-processor |
Service |
Location |
Amazon Web Services |
Application services / hosting |
EU |
Google Cloud Platform |
Application services / hosting |
EU |
Timescale (TigerData Cloud) |
Application services / hosting |
EU |
Sentry |
Application services / hosting |
US |
Mailgun |
Application services / hosting |
EU |
HubSpot |
Customer support / sales operations / ticketing |
EU |
OpenReplay |
Data analytics |
EU |