Security Is Our Priority
Your data is in good hands.
Atlas One is committed to protecting and maintaining the security of our systems and the data entrusted to us. In addition to using enterprise-level security best practices, we also undergo regular security audits, security reviews, and penetration testing in compliance with SOC 2 requirements.
Application Security
Continuous Monitoring
Independent third-party penetration, threat, and vulnerability testing.
Data Handling
Atlas One is in full compliance with GDPR and has support for data deletion.
Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES.
Role-based account access workflows.
Secure Hosting
Atlas One’s cloud environments are backed by Google Cloud’s security measures.
User access controls with single sign-on.
Ongoing Security Practices
Continuous Monitoring
The security and compliance status of our organization is constantly monitored to ensure there are no lapses.
Information Security Program
We follow an information security program that follows the criteria set by SOC 2 and is implemented throughout our organization.
Penetration Testing
Annual penetration testing by an independent third party ensures the security of our IT infrastructure. 
Roles and Responsibilities
Our information security program has clearly defined and documented roles and responsibilities. Every member of our team is committed to our responsibility of protecting customer data.
Security Awareness Training
Every member of our team undergoes mandatory security awareness training with topics that include industry-standard practices and information security.
Third-Party Audits
Our security controls are tested and evaluated by an independent third party on a regular basis.
Report Vulnerability
If you believe you’ve found a potential security issue, please let us know. We’ll address it as soon as possible.