Secure to the Core
SOC 2 Type I
Successfully completing SOC 2 Type I examination of components and services ensures we maintain a robust set of security controls, policies, and practices. The AICPA’s SOC for Service Organizations Trust Services Criteria regularly validates these protocols through external audits. Our SOC 2 Type I report is available to current and prospective enterprise customers upon request, subject to the appropriate non-disclosure agreements.
Vulnerability Disclosure
To report a security vulnerability, please email security@0pass.com.
Secure development process
We evaluate source code and dependencies, then combine that evaluation with an analysis of exploitability trends and simple versioning as a function of our Secure-SDLC.
We institute change controls across production environments and security controls as best practices to continuously improve our capability-maturity model.
Security Resources
0pass maintains online resources related to our policies, terms, and practices.
Documentation related to SOC II available to prospective enterprise customers upon request at security@0pass.com