Pendula is committed to providing a secure platform for its customers to securely and privately communicate with their customers.
Our security program is based on the following foundational principles:
Access must be based on a business need and only granted for the time it is required.
Security controls should be implemented and continuously monitored for their effectiveness and relevance.
Security risk must be continuously assessed and the security program must respond to the emergence of new risks.
All of Pendula’s team are active participants in the security program and understand the need to support the program.
Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to UK-GDPR, SOC2 and HIPAA.
Pendula maintains ISO 27001 and SOC2 Type 2 certifications. Both our ISO 27001 certificate and the SOC2 Type 2 report are available on our Trust Report page.
Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to UK-GDPR, SOC2 and HIPAA.
Pendula maintains ISO 27001 and SOC2 Type 2 certifications. Both our ISO 27001 certificate and the SOC2 Type 2 report are available on our Trust Report page.
Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to UK-GDPR, SOC2 and HIPAA.
Pendula maintains ISO 27001 and SOC2 Type 2 certifications. Both our ISO 27001 certificate and the SOC2 Type 2 report are available on our Trust Report page.
Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to UK-GDPR, SOC2 and HIPAA.
Pendula maintains ISO 27001 and SOC2 Type 2 certifications. Both our ISO 27001 certificate and the SOC2 Type 2 report are available on our Trust Report page.
All data stores with customer data are encrypted at rest.
Pendula uses TLS 1.2 or higher everywhere data is transmitted over public networks. Pendula also use features such as HSTS (HTTP Strict Transport Security) to maximise the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.
Encryption keys are managed via AWS Key Management System (KMS). KMS stores key material in Hardware Security Modules (HSMs), which prevents direct access by any individuals, including employees of Amazon and Pendula. The keys stored in HSMs are used for encryption and decryption via Amazon’s KMS APIs.
Application secrets are encrypted and stored securely via Pulumi secrets, and access to these values is strictly limited. Databases and backups are encrypted using AWS KMS and parameter store.
Pendula engages with one of the best penetration testing consulting firms in the industry at least annually. Pendula’s most recent penetration testing was conducted by CyberCX, a leading provider of Security Testing and Assurance services.
Pendula makes summary penetration test reports available via our Trust Report.
Security, Engineering and DevOps work together to ensure that Pendula is remediating vulnerabilities in the software and configurations within Pendula’s vulnerability management SLAs.
Pendula requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):
Static analysis (SAST) testing of code during pull requests and on an ongoing basis.
Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain.
External attack surface management (EASM) continuously running to discover new external-facing assets.
Datadog CSPM to detect vulnerable configurations in any AWS accounts.
All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates. Pendula uses device trust to enforce security standards on its end points before authentication to critical systems is allowed.
Pendula secures remote access to internal resources using Teleport, an identity aware proxy that allows short term access to critical resources. All access is secure via Okta with device trust and is audited.
Pendula provides comprehensive security training to all employees upon onboarding and annually through Knowbe4. All new employees attend a mandatory live onboarding session to understand Pendula’s key security principles. All engineers also attend mandatory developer security training.
Pendula’s security team shares regular security updates with the Pendula team and role specific updates for key departments.
Pendula uses Okta to secure our identity and access management. Pendula enforces the use of phishing-resistant authentication factors such as device trust.Pendula employees are granted access to applications based on their role, and are deprovisioned upon termination of their employment.
Pendula uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:
Once the inherent risk rating has been determined, the security of the vendor is evaluated in order to determine a residual risk rating and an approval decision for the vendor.
At Pendula, data privacy is a first-class priority—we strive to be trustworthy stewards of all sensitive data and to minimise the privacy data used by Pendula.
Pendula evaluates updates to regulatory and emerging frameworks continuously to evolve our program. Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to GDPR, UK-GDPR and HIPAA.
Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to GDPR, UK-GDPR and HIPAA.
View Pendula’s Privacy Policy
View our list of subprocessors
View our DPA