Security @ Hustle
Potential and existing customers may request a copy of Hustle’s SOC2 Type II report.
Our CSA STAR CAIQ is available at: https://cloudsecurityalliance.org/registry/hustle-inc/
Layers of Defense
Hustle’s infrastructure is protected by numerous layers of defense, known in the information security industry as a “defense-in-depth” strategy. Our security architecture includes:
- Bug Bounty Program
- Distributed Denial-of-Service (DDoS) mitigation
- Encryption of data in transit and at rest
- Intrusion Detection and Prevention Systems
- Penetration Testing
- Security Patch Management
- Security Information Event Management (SIEM) with anomaly and threat detection
- Vulnerability Scanning
We pay special attention to the OWASP Top 10 and have tailored our development processes to identify and mitigate these issues.
Every employee at Hustle, from office operations to our CEO, is dedicated to security and protecting our customer data in all that we do.
Hustle has a formal information security program in place. An experienced, certified security professional is dedicated to overseeing all of our security practices, policies and procedures with the safety of our customers’ data at the forefront of all efforts.
We also have an Information Security governance structure in place with an Information Security Steering Committee which meets periodically to review security-related initiatives at the product, infrastructure, and company level. All of our C-level executives are actively involved in maintaining and reviewing the information security program.
Backups and Redundancy
At Hustle, we view security not just as a core component of our technology, but also as a cornerstone of our company culture. All Hustle employees receive security training both as a new hire and regularly thereafter. Communication channels for any security issues or questions are always open for our employees and customers.