Secure to the Core

SOC 2 Type II

Successfully completing SOC 2 Type 2 examination of components and services ensures we maintain a robust set of security controls, policies, and practices. The AICPA’s SOC for Service Organizations Trust Services Criteria regularly validates these protocols through external audits.

Our SOC 2 Type II report is available to current and prospective enterprise customers upon request, subject to the appropriate non-disclosure agreements.

Vulnerability Disclosure

To report a security vulnerability, please email [email protected]

Secure development process

We evaluate source code and dependencies, then combine that evaluation with an analysis of exploitability trends and simple versioning as a function of our Secure-SDLC. 

We institute change controls across production environments and security controls as best practices to continuously improve our capability-maturity model.

Security Resources

0pass maintains online resources related to our policies, terms, and practices.

Request a free demo with a 30 day trial

Have your team log in with security keys and get to work in seconds.

Identity tied to PKI

A smooth rollout

Hands-on support