top of page

Security Information

Data Security


Sunlight encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

​

Application Security


Sunlight regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.

​

Sunlight also uses high-quality tooling provided by Snyk Advanced Security such as Snyk Code (SAST), Snyk Open Source (SCA), Snyk Container and Snyk IaC, as well as Bitbucket Secret scanner to secure our product at every step of the development process.

​

Infrastructure Security


Sunlight uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.

​

In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.
 

bottom of page