Security at Unblocked

Unblocked has been designed with security in mind from day one, leveraging our team's deep technical expertise from years of building security-focused, cloud-based services, including major customer-facing products at AWS, Microsoft, Meta, Apple, and more.

Customer data is isolated, authorized, and encrypted. Your data will never be used to train shared models.

Trusted by teams building at scale

Security Certificates

AICPA SOC 2

Unblocked is AICPA SOC 2 Type II certified, underscoring our commitment to maintaining top-tier security standards with regular third-party penetration testing.

AICPA SOC 2

Cloud Application Security Assessment

Unblocked has achieved CASA Tier II verification, highlighting our adherence to the core security principles for cloud services.

Cloud Application Security Assessment

Data Security

In transit

All communications between clients and services as well as service and data stores are secured using TLS encryption.

At rest

All data stores are configured with encryption at rest using AWS managed encryption keys.

Privacy

Customers own their data. Unblocked does not sell data or use customer data to train shared models.

Retention

Data is removed upon deletion, for both accounts and integrations.

Team-based data access

Access to data across network layers is secured with encryption using customer-specific keys.

Product Security

Authentication & Authorization

Unblocked does not store any user passwords, nor does it implement its own identity services. Authentication is performed via SAML SSO or OAuth 2.0 to your identity provider. Access to resources is authorized at every level of the stack from the network down to the DB.

Fine-Grained Access Controls

Unblocked respects access control settings from each data integration you connect.

Operational Security

Security Testing

We conduct a range of security tests on an ongoing basis, including penetration testing, static and dynamic module scans, and code scanning.

Detection and Response

We employ a range of detection methods throughout our stack, including monitoring administrative endpoints, and have formalized a robust response framework should an incident arise.

Corporate Security

Background Checks

All new team members are required to complete a background check during onboarding, as permitted by local law.

Security Training

All employees are required to complete security training as part of their onboarding process.

More questions about security?

Visit our trust center to review our SOC 2 and security documentation.

Visit our Trust Center