Security Overview

Security and Privacy at Watchtower

Prioritizing security is essential to our purpose; we believe that strengthening our customers' safety and compliance hinges on our dedication to robust internal protocols.

Data protection

Watchtower makes sure data is encrypted and protected at all steps of the process

Encrypted data at rest.

All datastores with customer data, in addition to S3 buckets, are encrypted at rest.
Encrypted Data in Transit

Employing TLS 1.2 or higher for data transmission across potentially insecure networks, we also utilize HSTS (HTTP Strict Transport Security) to optimize in-transit data security.
Secrets Management

Application secrets are encrypted and stored securely. Encryption keys are managed via AWS Key Management System (KMS), secrets managed in Doppler.
Real-time trust

Compliance at Watchtower

Watchtower maintains a SOC 2 Type I and Hipaa compliance. Our SOC 2 Type I report certificate are available on our Trust Report.

Report Available 6/23
Active & Realtime

Vulnerability Scanning & Threat detection

Watchtower requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):
  • SAST
  • SCA
  • DAST
  • Easy QR Codes
  • AWS Gaurdduty
  • CloudDefense

Strict Third Party Vendor Review

Our team follows a strict vendor review process. This means we only work with top notch companies and cloud providers. Here are a few: