Security best practices adopted
in StackSpot's development

When developing StackSpot, we protect data, systems, and assets using a comprehensive approach — including strong identity and access management (IAM), protecting data at rest and in transit, and preparing for security events through automated detection and response mechanisms.

We adopted security best practices — such as regular risk assessments, continuous monitoring, and compliance with regulatory requirements — to create secure and resilient infrastructure that supports our users’ dynamic needs.

Below, you’ll find details of good security practices we deploy while developing StackSpot.

1. Security Architecture

At StackSpot, we designed our platform with a robust security architecture, ensuring comprehensive protection for all components. This includes multi-layered defenses and a thorough understanding of threat landscapes to provide proactive security measures.

2. Security Foundations

Our security foundations are built on best practices and standards, emphasizing strong baseline security controls. We continually update these foundations to adapt to emerging threats and maintain a secure environment for our users.

3. Identity and Access Management (IAM)

We enforce stringent identity and access management (IAM) protocols to restrict system access to authorized individuals only. This includes using multi-factor authentication, role-based access controls, and regular audits to uphold the principle of least privilege.

4. Infrastructure Protection

Protecting our infrastructure is a top priority. We employ advanced threat detection and prevention mechanisms, alongside regular patching and updates, to safeguard our infrastructure from vulnerabilities
and attacks.

5. Data
Protection

Data protection is at the core of our security strategy. That’s why we use encryption for data at rest and in transit. In addition, comprehensive data management policies guarantee the confidentiality, integrity, and availability of our users’ data.

6. Application Security (AppSec)

Our approach to application security (AppSec) involves continuous security assessments, code reviews, and automated testing to identify and mitigate vulnerabilities. By integrating security into the development lifecycle, we ensure that our applications are resilient against potential threats.

7. Compliance

We have rigorous compliance standards to meet regulatory requirements and industry best practices. Our platform supports compliance with:

Light gray image of PCI - DSS certification. The format is circular, with "PCI - DSS" at the top, "Assessed by Cipher - a Prossegur company", 2023" in the middle, and "Compliant" at the bottom.
PCI-DSS: Secure handling of credit card information.
Light gray image of ISO 27001 certification. In the center is a circular shape with "ISO" centered, and around the shape is the following: "ISO 27001 Information security".
ISO 27001: Robust information security management system.
Light gray image of HIPAA (Health Insurance Portability and Accountability Act) certification.
HIPAA: Protection of sensitive health information.
Light grey image of AICPA SOC certification in circular format, with the phrase "Service Organization Control Reports" at the top, "Service Organizations" in the middle, and "Formerly SAS 70 Reports" below.
SOC 1: Financial reporting controls.
Light grey image of AICPA SOC 2 certification in circular format, with the phrase: AICPA Service Organization Control Reports at the top, "Service Organizations" in the middle, and "Formerly SAS 70 Reports" below.
SOC 2: Security, availability, processing integrity, confidentiality, and privacy.