TRUST CENTER

Data security & privacy

Learn more about how we safeguard our information assets, and those of our customers, against misuse, abuse or compromise.

TOOLS

How we secure our products

Cloud security &
best practices

Our services are hosted on Amazon Web Services infrastructure and we use MongoDB Atlas for storage. We leverage their world-class data centers in the US and EU to protect information and meet core security and compliance requirements. More information about their security practices is available at:

AWS Security
MongoDB Security

Training & awareness

As part of our initial onboarding process, as well as on an ongoing basis (at least annually), all staff receive training regarding their respective information security/privacy obligations. In addition. our engineers perform secure code training on the OWASP Top 10

Vulnerability management

We continuously monitor for malicious activity, and regularly scan our infrastructure, applications and third-party libraries for known vulnerabilities.

All our products go through a series of peer reviews and security assessments prior to deployment, including third-party library scanning, static code analysis and static container analysis. We also regularly engage expert third-parties to perform penetration tests in addition to our internal testing and scanning programs.

Access & authentication

We support single sign-on (SSO) so you can implement your own authentication systems to control access to our platform.

Within Secure Code Warrior, we implement least privilege principles and access to production data is restricted through security groups and limited to staff that strictly need it for support. We also use multi-factor authentication (MFA) and ephemeral credentials to strictly control access to production systems

Security, privacy & legal resources

Our security program

We are committed to providing a highly secure and reliable platform using proven, tested, best-in-class technologies, practices, and procedures.

Security certification & documentation

Click the links below to view and validate our ISO certifications.

ISO 27001:2013

ISO 27701:2019

If you require the following resources, kindly reach out to your account manager or email our support team  - support@securecodewarrior.com

  • SCW Pentest Summary Report
  • SCW Cyber Insurance Certificate
  • FSQS-NL Certificate
  • Platform/Dataflow Diagram

Assessment questionnaires

The following resources are provided in Secure Code Warrior's Security pack.
If you require the following resources, kindly reach out to your account manager or email our support team  - support@securecodewarrior.com

- Shared Assessment SIG Lite Questionnaire
- Cloud Security Alliance CAIQ

Whitepaper

Read our Security and Privacy Whitepaper to learn more about how we leverage policies, procedures and AWS’ world-class security features to protect our information assets.

Whitepaper

Report a vulnerability

If you are a security researcher or user of the Secure Code Warrior Learning Platform, and have discovered a potential security vulnerability we'd appreciate your help in disclosing it in a responsible manner and encourage you to let us know right away.

Responsible disclosure policy 

Our privacy program

Your personal data is important to us and we are committed to protecting it through close adherence to international regulations and industry best practice.

Privacy policy

Your privacy is important to us, and so is being transparent about how we collect, use, and share information about you.

For more information about how and why we process personal data, please refer to our privacy policy. This applies to anyone that visits our website, uses our platform or otherwise engages with us or our services.

Privacy policy

Cookies

We use essential cookies to help make sure our website and platform are functioning properly, and to deliver the secure and sleek service you expect from us. For more information about how and why we use cookies (including non-essential cookies), please refer to our cookie policy.

Cookie policy

GDPR and beyond

We recognize the importance of safeguarding the personal information we handle and are committed to meeting, and helping our customers meet, the relevant data protection regulations that apply worldwide. We do so by aligning ourselves with the EU GDPR’s requirements and industry best practice.

Click the link below for more information.

GDPR and beyond

Data processing addendum

Our data protection addendum is tailored to our service and designed to meet the international contractual needs of our customers.

It incorporates EU and UK GDPR requirements (including Standard Contractual Clauses for international transfers) and additional provisions for the CCPA.

Data processing addendum

Sub-processors

We work with a carefully vetted selection of third parties who process personal data on our behalf to help deliver our services.

Click the link below for a list of our current sub-processors. 

List of sub-processors

International transfers

We conduct Transfer Impact Assessments when  transferring personal data outside of the EEA/UK and ensure appropriate safeguard are in place before doing so.

For more information, please read our page on international transfers.

International transfers

Our legal team

Our dedicated Legal team helps our business meet the needs of our customers by providing strategic advice on an increasingly complex, global and ever-changing regulatory landscape.

Terms of use

Click the links below to access our terms of use for the Secure Code Warrior website and APIs.

Website terms of use 

SCW API terms of use

Customer agreements and terms

Click the links below to access our subscription and service level agreements for customers.

Customer subscription agreement

Service level agreement (SLA)

Data processing addendum

Partner agreement and terms

Click the links below to access our subscription and service level agreements for partners. 

Partner subscription agreement

Partner deal registration T&Cs

Service level agreement (SLA)

Data processing addendum

Other documents

Click the below links to access other legal documents that may be appropriate to your relationship with Secure Code Warrior.

Secure Code Warrior Sensei License T&Cs

Entry into SCW Devlympics T&Cs

Trademarks

W9 taxpayer identification

CONTACT US

Looking for something more specific?

Additional privacy and security documents are available upon request, but may require a mutual non-disclosure agreement to be completed. Please complete the form below and we'll be in contact with you to explore your request.

We would like your permission to send you information on our products and/or related secure coding topics. We’ll always treat your personal details with the utmost care and will never sell them to other companies for marketing purposes.

Send
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Want more?

Get the latest on developer-driven security

Our extensive resource library is full of helpful resources from whitepapers to webinars to get you started with developer-driven secure coding.