Security & Compliance
Data in transit: All data transferred between the user’s browser and Rhythmos’s servers is encrypted in transit. Rhythmos uses SSL/TLS v1.3.
Data at rest: Data is encrypted at rest in GCP using AES-256 encryption.
Data center security
Data center provider: Rhythmos uses Google Cloud Platform (GCP) to host its production servers, databases, and supporting services.
Multi-region: Rhythmos uses a multi-region setup for it’s infrastructure. The principal region for running the application is GCP region US-Central 1 (Iowa), with GCP region US- West 1 (Oregon) for its backup.
Backups: Rhythmos’s production systems and data are backed up on a regular basis. We run through a checklist to verify data is recorded and usable. Backups are tested on a periodic basis.
Access controls: Rhythmos’s system access is based on limited controls and is reviewed periodically. Rhythmos enforces the policy of least privilege.
Testing and review: All changes to our application are subject to peer review and are tested prior to being merged.
Separate environments: Rhythmos maintains segregated testing, development and production environments.
Penetration testing: Rhythmos’s security team uses third parties to conduct penetration tests to identify deficiencies in the system that may affect critical assets.
Vulnerability scanning: Rhythmos uses third-party security tools to continuously scan our applications, systems, and infrastructure for security risks and vulnerabilities.
Code analysis: Rhythmos’s code repositories are regularly scanned for security issues using static code analysis.
Automatic dependency management: Rhythmos uses automated tooling to actively check for dependency updates for a proactive, rather than reactive, security stance.
Multi-Factor Authentication: Rhythmos allows you to add an extra layer of security to your account by enabling two-step verification, also called two-factor authentication. This reduces the risk of having your account accessed by anyone else.
Single Sign On: Rhythmos offers integration with customer’s single sign on systems that are compliant with industry standards like LDAP and SAML.
Third Party Identity Provider: Rhythmos applications are secured by a third party identity provider, utilizing JWT based authentication and authorization for all backend APIs.
Dedicated Team: Rhythmos has a dedicated team responsible to ensure all security practices and policies are enforced. This team is also responsible in responding to any security incidents efficiently and quickly.
Policies: Rhythmos maintains a robust listing of security policies which are updated regularly and must be reviewed at a minimum of each year by each employee. Policies are communicated to employees and are available for review at any time.
Training: All Rhythmos employees are required to complete security training upon joining the company.
Background checks: Background checks are performed on all Rhythmos candidates prior to hiring.
New-hire reviews: All Rhythmos employees are required to sign Rhythmos’s information security policy and confidentiality agreements upon joining the team.
SOC2 Reports: Rhythmos maintains AICPA System and Organization Controls (SOC) 2 Type II Report. The SOC Report is available to customers after an NDA has been signed. Please reach out to email@example.com to obtain a copy of Rhythmos’s most recent SOC 2 Type II Report. Click here for more information on AICAP’s SOC2 report.