Trust Center
Security and compliance at every layer.

Polarity Labs is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
support@polarity.so
Compliance
SOC 2 Type II
Service Organization Control
SOC 2 Type I
Service Organization Control
Controls
64 controls across 25 categories.
Asset management
2
Asset management
2- Secure media disposal
- Technology asset inventory
Business continuity and disaster recovery
4
Business continuity and disaster recovery
4- Multi-availability zone deployment
- Business continuity and disaster recovery plan
- Database backups
- Emergency operations continuity
Capacity and performance planning
1
Capacity and performance planning
1- Capacity and performance monitoring
Change management
2
Change management
2- Material system change communication
- Customer notification for major changes
Cloud security
1
Cloud security
1- Cloud provider physical access review
Configuration management
1
Configuration management
1- Baseline configuration management
Continuous monitoring
1
Continuous monitoring
1- Centralized log collection and monitoring
Cryptographic protections
3
Cryptographic protections
3- Encryption at rest
- Production key management
- Encryption in transit
Cybersecurity and data privacy governance
5
Cybersecurity and data privacy governance
5- Information security policies
- Whistleblower mechanism
- Organizational structure documentation
- Information security officer designation
- Security roles and responsibilities
Data classification and handling
3
Data classification and handling
3- Customer data deletion
- Data retention and deletion policy
- Data classification and access control
Endpoint security
2
Endpoint security
2- Anti-malware protection
- Removable media controls
Human resources security
5
Human resources security
5- Employee confidentiality agreements
- Termination access revocation
- Disciplinary process
- Employee background checks
- Contractor background checks
Identification and authentication
5
Identification and authentication
5- Session timeout enforcement
- Password policy
- Access control procedures
- Least-privilege access for production infrastructure
- Production access management
Incident response
3
Incident response
3- Incident response procedures
- Security incident logging
- Security concern resolution
Information assurance
1
Information assurance
1- Security documentation availability
Mobile device management
1
Mobile device management
1- Mobile device management
Network security
4
Network security
4- Firewall rule management
- Secure connection requirements
- Network firewall
- Network architecture documentation
Physical and environmental security
1
Physical and environmental security
1- Visitor management policy
Risk management
3
Risk management
3- Security and privacy risk management
- Annual risk assessment
- Cybersecurity insurance
Secure engineering and architecture
5
Secure engineering and architecture
5- Source code access controls
- Source code change approval
- Secure development procedures
- Environment separation
- Environment and tenant segmentation
Security awareness and training
1
Security awareness and training
1- Security awareness training
Security operations
2
Security operations
2- Intrusion detection
- Customer support availability
Third-party management
5
Third-party management
5- Outsourced development security
- Vendor management program
- Contractor confidentiality agreements
- Contractual security commitments
- Vendor confidentiality and privacy agreements
Vulnerability and patch management
2
Vulnerability and patch management
2- Patch management
- Vulnerability scanning and remediation
Web security
1
Web security
1- Web application firewall
Subprocessors
DigitalOcean
Cloud Infrastructure & Platform Services
Anthropic
AI Model Provider
OpenAI
AI Model Provider
AI Model Provider
AWS
Cloud Infrastructure
xAI
AI Model Provider