Security at Raptor Maps
Last Modified: May 9, 2024
SOC 2 Certified
Data Security
Raptor Maps encrypts data at rest and in transit for all of our customers. All data is written to multiple disks instantly, backed up daily, and stored in multiple locations.
Application Security
Application Security at Raptor Maps is maintained by development best practices and automated testing. During development, we rely on a mandatory peer review process as the first line of security review. Alongside the manual review process, Raptor Maps runs automated static analysis checks and manual security testing. Formal operational and change control processes ensure only approved changes are deployed to production.
Infrastructure Security
Raptor Maps uses Amazon Web Services to host our application. Furthermore, our infrastructure is protected using multiple layers of defense mechanisms, including but not limited to:
Firewalls for enforcing IP whitelisting and access through permitted ports only to network resources
A web application firewall (WAF) for content-based dynamic attack blocking
DDoS mitigation and rate limiting
Comprehensive logging of network traffic
Use of AWS security tools including KMS, and GuardDuty
Security Awareness and Training
Raptor Maps understands that its security is dependent on its employees. Therefore, all of our employees undergo information security awareness training during onboarding. Further security training is provided on an annual basis. Additionally, all employees must sign our Acceptable Use Policy.