At Stoplight, we are steadfast in following a design-first approach in all that we do, and we recognize that proper security is a critical component of getting that design right for our customers the first time. Security and compliance are fundamental to your experience with the product, and Stoplight is committed to securing your data, eliminating vulnerabilities, and ensuring continuity of access.
Stoplight uses various industry-standard technologies and services to secure your data from unauthorized access, disclosure, use, and loss. In addition, all Stoplight employees undergo background checks before employment and are trained on security practices during company onboarding and annually throughout the year.
Security is directed by Stoplight's Chief Information Security Officer and maintained by Stoplight's Security & Operations (DevOps) team.
Our security plan also covers various other areas of interest, including logical access control, penetration testing, third-party audits, intrusion detection and prevention, business continuity and disaster recovery, data encryption, single-sign-on, two-factor authentication, and more.
To learn more and for an in-depth look at our security practices, please download the helpful Stoplight Security White Paper at the top of the page.
Contents