Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Welcome to Wet Fish's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Compliance

We adhere to industry best practices and we are working towards compliance certifications.

Documents

APP SECURITYApplication Penetration Testing
Access Monitoring
Data Backups
Data Erasure
View more

Subprocessors

Knowledge Base (FAQ)
  • Provide details of any regular independent annual security audit the hosted service provider is subjected to. These details are to include scope and a copy of the results of the most recent review.
  • Describe the level or strength of password controls available for accessing "Customer" data.
  • Describe data encryption process: during transmission, at rest (database and storage), and at backup or off-line storage. Include details of key management and cryptographic algorithms.
  • Describe any multi-factor authentication capability available for "Customer" and how this will be implemented.
  • Describe and provides details of how "Customer" information of will be protected from Application Vulnerabilities such as OWASP10. Including handling of HTTP Security Headers HTTP Content-Security-Policy HTTP Public Key Pinning Extension HTTP STS HTTP X-Permitted-Cross-Domain-Policies X-Content-Type-Options X-Frame-Options X-XSS-Protection
View more
Built onSafeBase by Drata Logo