Your security is our priority
Hash Labs adheres to rigorous information security policies and procedures. We are an industry leader and standard setter in cyber security in the start-up space. We have already completed our first cyber security audit and have received our SOC 2 certificate. The SOC 2 Type II provides an independent assurance that an organization runs its systems safely and securely.
SOC 2 Type I certification is among the most coveted and hardest to obtain of all the information-security certifications. It demonstrates that an expertly trained independent accounting and auditing firm has examined an organization’s controls related to the trust principles of security, privacy, confidentiality, availability, and processing integrity, and has actually tested those controls over time to ensure that they are operating effectively.
Data center security
Our data center security is based on various types of assurances, including formal certifications, attestations, validations, authorizations, and assessments produced by independent third-party auditing firms, as well as contractual amendments, self-assessments, and guidance documents.
Our servers are hardened according to best-in-class NIST standards and include truly next-gen security tooling, file integrity monitoring (FIM), APT, and rootkit detection. All servers log to read-only SIEM with 24×7 monitoring and alerts.
All connections and communication is transmitted over SSL (TLS), ensuring data privacy and integrity. Our servers only support the highest level of encryption 256-bit cipher suites TLS 1.2 or TLS 1.3, protecting against unauthorized disclosure, modification, and replay attacks.
We perform regular static and dynamic application, internal and external network scans and system vulnerability scans using professional penetration testing tools to root out the latest in web, application, and system vulnerabilities.
Our third party security partner provides cyber security management through a threat prevention and response platform, keeping track of our security measures and countermeasures, view analytics and reports. Our third party SOC teams work together to ensure our environment is free of invaders by eradicating existing ones, while implementing countermeasures to defend against future attacks.
We engage the industry’s best third-party consulting firms to perform penetration testing replicating the most malicious modern hacking attacks and strategies.