Encryption Everywhere
TLS 1.3 for every connection, AES-256 at rest, and AWS KMS-managed keys across services and backups.
We safeguard taxpayer data with bank-level encryption, hardened infrastructure, and a rehearsed incident response program aligned to IRS and FTC requirements.
TLS 1.3 for every connection, AES-256 at rest, and AWS KMS-managed keys across services and backups.
Google Firebase authentication, MFA support, and role-based policies scoped to each organization.
Streaming telemetry, alerting thresholds, and anomaly detection backed by quarterly incident drills.
Security controls mapped to IRS Publication 4557, FTC Safeguards Rule, NIST CSF, and ISO 27001 principles.
Open each area to see exactly how we protect taxpayer data, operate our controls, and prove ongoing compliance.
Every new integration is reviewed for encryption posture before it is allowed to handle live data.
org_id to maintain tenant isolation across services.Automated alerts and log correlation flag deviations in near real time.
Security on-call validates the signal, locks compromised accounts, and captures evidence.
Impacted organizations receive coordinated updates per FTC Safeguards and IRS guidance.
Post-incident reviews document root cause, compensating controls, and customer follow-up.
Controls are mapped to the regulations and frameworks tax professionals rely on to prove compliance.
Written information security program (WISP), access monitoring, and incident response readiness.
Annual risk assessments, designated security lead, vendor oversight, and customer notification plans.
Identify, Protect, Detect, Respond, Recover controls mapped to our security roadmap.
Information security policies, asset inventories, and change management aligned to ISO annex controls.
Payment workflows isolated with provider tokenization and secure key handling.
Minimum necessary access, audit trails, and breach notification protocols adapted for tax data.
We only partner with vendors that can meet or exceed our security posture and maintain verifiable certifications.
Delivers authentication, MFA, and secure session tokens backed by Google’s global infrastructure.
Primary hosting, encryption, KMS, CloudFront distribution, and IDS/IPS tooling with SOC 2 Type II coverage.
PostgreSQL platform with encrypted storage, zero-downtime branching, and point-in-time recovery.
Workflow automation with encrypted webhooks and per-tenant isolation for customer integrations.
Vendor reviews are performed annually or whenever a material change is announced.
Security works best when your team follows the same high bar. These are the practices we recommend every organization enforces internally.
Want to learn more about our security posture and chat about yours? Contact our security team directly using the information below.
If you suspect a security issue or want to request additional documentation, contact us right away.
Please include relevant timestamps, screenshots, and contact details so we can respond without delay.