
We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.
SOC 2 Type II is an audit report that evaluates the design and operating effectiveness of security controls over a period of time. This demonstrates that our systems maintain high standards for security, availability, processing integrity, confidentiality, and privacy.
ISO 27001 is the international standard for information security management systems (ISMS). This certification demonstrates that we have implemented a comprehensive framework for managing sensitive information securely.
Access our security documentation, policies, and compliance reports.
Incident Response Policy document
Change Management Policy document
Information Security Policy document
Business Impact Assessment Policy document
Information Security Management System Communication Plan Policy document
Data Handling Policy document
Our comprehensive security program includes controls across multiple domains to protect your data.
We carefully select and monitor all third-party services that process data on our behalf.
Business Apps & Productivity
Cloud Infrastructure & Platform Services
Code & Build Security
Data Stores & Warehouses
Find answers to common questions about our security and compliance practices.
At Squid, security isn't just a feature - it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us - whether from our customers, their end users, or anyone who interacts with our organization - with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection. 🦑