Sign up
Log in
Sign up
Log in

Security at OctoML

Your data security and privacy is a top priority for OctoML. We continually invest in security capabilities and practices in our platform and processes.We received SOC2 Type I certification in late 2022 and are underway for SOC 2 Type II. The below is a partial list of security measures we take to ensure our platform and data are secure.

If you have questions about using OctoML and meeting your specific compliance needs, let's setup a time to talk.

Contact Us
AICPA SOC2 Type 1 certification badge

Product Security

Operational Security

policies icon yellow
policies icon blue

Policies

OctoML has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.

employee training icon yellow
employee training icon blue

Employee Training

Each OctoML employee is trained on security best practices and awareness during onboarding and continue with ongoing training programs. We perform disaster recovery and data restoration tests on an annual basis.

change control icon yellow
change control icon blue

Change control

OctoML uses robust change control policies to balance control and speed when making changes to the system.

backup and recovery icon yellow
backup and recovery icon blue

Backups and Recovery

OctoML takes regular backups of data and performs regular tests of restoring that data in the event of a serious incident.

pentest icon yellow
pentest icon blue

Pentests

We engage third-party security experts to perform detailed penetration tests on the OctoML platform.

Incident Reporting

Incident Response - OctoML has developed and uses policies and procedures for handling security events. These policies are regularly reviewed and updated. Also, OctoML has a responsible disclosure of security issue policy in place.