Tangibly 的安全
Tangibly is built to protect high value intellectual property. Our security practices combine encrypted cloud infrastructure, strict access controls, tenant isolation, continuous monitoring, and regularly audited internal processes. This ensures your data remains confidential, intact, and available only to the right people.
Platform Infrastructure
Tangibly is hosted on Amazon Web Services, a secure and resilient cloud environment. AWS provides physical security, network protection, and redundancy. Tangibly manages the application layer, data, and platform configuration according to the AWS shared responsibility model. Our infrastructure includes built in redundancy and failover systems to maintain availability and minimize downtime.
You can learn more about the AWS security program at https://aws.amazon.com/security.
Data Protection
Tangibly uses end to end encryption for all data transmitted to and from the platform. Information is encrypted in transit using TLSv1.2 or higher and encrypted at rest using AES256. Encryption keys are managed through AWS Key Management Service for strict control and auditability. Each customer’s information is kept separate through strong tenant isolation so no data is ever shared or accessible across accounts.
Access and Controls
Access to Tangibly is protected through strong authentication, password requirements, and optional multi factor authentication. Administrators can assign granular permissions based on user role, ensuring individuals only see the information necessary for their responsibilities. These controls support internal governance, reduce accidental exposure, and create clear accountability.
Operational Security
Tangibly’s internal team follows strict security practices that include regular security training, secure development standards, and ongoing review of emerging risks. The platform undergoes routine internal assessments and independent third party audits to ensure our controls remain aligned with industry expectations.
SOC 2 Compliance
Tangibly is SOC 2 Type II compliant for Security and Confidentiality. This certification verifies that our security policies, procedures, and operational controls meet the standards set by the American Institute of Certified Public Accountants. The audit evaluates how our controls perform over time and reflects our continued commitment to safeguarding customer information.
报告安全问题
If you identify a potential security issue or vulnerability, you can submit a report through our security disclosure form. Our team will review and respond promptly.
Read more about our security here.
