Vinyl was built with security at its core.
Because when it comes to low-code application development, security and compliance are top of mind for IT and enterprise leaders everywhere. Here’s a look at all the ways security is fundamental to the Vinyl platform – and the work we do continuously to keep our customer data safe.
Vinyl is fully compliant with SOC 1 Type II and SOC 2 Type II validated via a Service Organization Controls (SOC) audit issued by the Association of International Certified Professional Accountants. SOC 1 and SOC 2 represent assurances on operational controls at a service organization. Vinyl holds an active SOC 1 Type II report and an SOC 2 Type II report.
We maintain state-of-the-art security and monitoring with our networks and services, including:
- Active Monitoring
We continuously monitor all our services to ensure optimal service and uptime. Our Support Team is available to customers with an SOW agreement.
- Disaster Recovery Plan
A current Disaster Recovery Plan (DRP) is maintained in the event of an emergency.
Our product team regularly performs audits and checks on the platform itself, in addition to running thorough QA and UAT testing with every Vinyl release. Some of these additional audits include:
- Penetration Testing
The Vinyl platform undergoes annual penetration testing which is performed by a third-party company. This testing helps us identify any weaknesses in our systems, network, and infrastructure.
- Additional Security Testing
We have undergone the Service Organization Controls (SOC) audit. We leverage Veracode and SourceClear to help assess and maintain Vinyl’s security.
- Veracode is used to scan and identify any static vulnerabilities
- SourceClear reviews libraries our technology use
At the application level, Vinyl developers are responsible for implementing and maintaining the security measures and configuration. If required, we can work with our customers to develop compliant applications. The Vinyl platform, in combination with proper security measures, standards, and configuration, can be used to build apps that are compliant with HIPAA, PCI, and GxP.
Vinyl provides many different methods to implement and control application-level access and security. Examples of application security:
- Providers & Identities
Vinyl’s security model supports multiple, configurable security providers. Security providers handle user authentication to an application, data source authentication, connection-level security, and authorization policies.
- Privileges & Permissions
Vinyl’s application security model is composed of Users, Groups, Privileges, Roles, and Permissions. Collectively these elements allow a developer to group and provision the right access to the right users.
- Native Audit
Vinyl provides auditing capabilities out of the box and a simple method for developers to enable enhanced auditing if desired. This functionality provides a visual log to any changes made to each record.
Vinyl promotes the rapid development of secure applications along with their ability to be quickly deployed in a secure environment. Native security features and configuration options available within the Vinyl platform enable developers to configure and secure their applications.