Squid logo
Live monitoring by Delve
Squid Compliance Report
Squid is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IIIn Observation

SOC 2 Type II

SOC 2 Type II is an audit report that evaluates the design and operating effectiveness of security controls over a period of time. This demonstrates that our systems maintain high standards for security, availability, processing integrity, confidentiality, and privacy.

In the observation period
ISO 27001In Progress

ISO 27001

ISO 27001 is the international standard for information security management systems (ISMS). This certification demonstrates that we have implemented a comprehensive framework for managing sensitive information securely.

Continuously monitored

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

Incident Response Policy

Incident Response Policy document

Updated: January 2026
PDF

Change Management Policy

Change Management Policy document

Updated: January 2026
PDF

Information Security Policy

Information Security Policy document

Updated: January 2026
PDF

Business Impact Assessment Policy

Business Impact Assessment Policy document

Updated: January 2026
PDF

Information Security Management System Communication Plan Policy

Information Security Management System Communication Plan Policy document

Updated: January 2026
PDF

Data Handling Policy

Data Handling Policy document

Updated: January 2026

Security Controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Infrastructure

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Baseline Configuration Management
Completed

Data Privacy & Security

LIVE
Backup and Recovery Policy
Completed
Data Retention and Deletion Policy
Completed
Database Backups
Completed

Risk & Incident Management

LIVE
Annual Risk Assessment
Completed
Breach Notification Communication
Completed
Capacity and Performance Monitoring
Completed

Compliance & Governance

LIVE
Whistleblower Mechanism
Completed

Other

LIVE
Anti‑malware Protection
Completed
Application Outages
Completed
Asset Register Maintaining
Completed

Subprocessors Directory

We carefully select and monitor all third-party services that process data on our behalf.

Google Workspace logo

Google Workspace

Business Apps & Productivity

Vercel logo

Vercel

Cloud Infrastructure & Platform Services

GitHub logo

GitHub

Code & Build Security

Supabase logo

Supabase

Data Stores & Warehouses

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Squid, security isn't just a feature - it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us - whether from our customers, their end users, or anyone who interacts with our organization - with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection. 🦑