Here at Akeero we understand that our customers expect us to protect their data with the highest standards and are committed to providing them with a highly secure and reliable environment.
Our security model and controls are based on international standards and industry best practices, including as ISO 27001, OWASP Top 10 and AWS Well Architected.
Akeero implements a security oriented design in multiple layers, on both the application and infrastructure layer: The Akeero application is developed according to the OWASP Top 10 framework and all code is peer reviewed prior to deployment to production. Our controlled CI/CD process includes static code analysis, software composition analysis, vulnerability assessment, penetration testing, and more.
Independent third party assessments are crucial in order to get an accurate, unbiased understanding of an organisation’s security posture. Akeero conducts penetration tests on an annual basis or after any major change, both at the application and the infrastructure level, using highly qualified, independent assessors.
While Akeero uses Okta internally for employee authentication to business systems, we are not affected by the recent compromise that affected Okta. There has been no loss of confidentiality, integrity or availability of any of Akeero's systems and data.
Anthi Gilligan Chief Information Security Officer Akeero
If you think you may have discovered a vulnerability, please send us a note.