Technical Safety

Trust by Architecture

Security is not a feature—it's the core engineering discipline that defines twistyHR.

Zero Trust Architecture

Every request is authenticated, authorized, and continuously validated before being processed by our internal microservices.

Infrastructure as Code

Our environment is defined and audited in code. No manual changes of configuration are allowed in production.

Obsessive Monitoring

24/7 endpoint detection, response, and behavioral analysis to identify anomalies before they become incidents.

The Security Stack

ParameterStandard / SpecificationCapability
Data Encryption (At Rest)AES-256-GCM
Industry standard hardware-accelerated encryption.
Data Encryption (In Transit)TLS 1.3 / mTLS
Perfect forward secrecy with modern cipher suites.
AuthenticationSAML 2.0 / OIDC
Seamless integration with Okta, Azure AD, and Google.
Uptime Infrastructure99.99% SLA
Multi-region active-active deployments across AWS & GCP.
Database IsolationSingle-Tenancy Option
Dedicated instances available for enterprise tier.
SOC 2 TYPE IIGDPR COMPLIANTISO 27001HIPAA READYCCPA COMPLIANT

Responsible
Disclosure

Think you found a vulnerability? Our security researchers are our core partners. We run an active bug bounty program with competitive payouts.

Need a Security Review?

Download our complete trust package including SOC 2 reports, penetration test summaries, and architecture diagrams.

  • SOC 2 Type II Report (Latest)
  • Penetration Test 2026 Summary
  • Compliance Readiness Matrix