Trust, security, and privacy at Vinny

Security, privacy, and responsibility are built into everything we do - helping our customers improve their security and compliance posture starts with our own.

a modern apartment building exterior, shot from the ground looking up and including the sky

Trust, security, and privacy at Vinny

Security, privacy, and responsibility are built into everything we do - helping our customers improve their security and compliance posture starts with our own.

a modern apartment building exterior, shot from the ground looking up and including the sky

Trust, security, and privacy at Vinny

Security, privacy, and responsibility are built into everything we do - helping our customers improve their security and compliance posture starts with our own.

Header Image

Our Security and Privacy Team establish policies and controls, monitor compliance, and validate our security posture with third-party auditors

Our Security and Privacy Team establish policies and controls, monitor compliance, and validate our security posture with third-party auditors

Our policies are based on the following foundational principles:

01.

Access is granted on a need-to-know basis, using the principle of least privilege.

02.

Security controls are layered according to the principle of defense-in-depth.

03.

Security controls are applied consistently across the enterprise.

04.

Controls are continuously improved to be more effective, auditable, and frictionless.

Security and Compliance at Vinny

Vinny maintains a SOC 2 Type II attestation and an ISO 27001 compliance certification. Our SOC 2 Type II report and ISO 27001 certificate are available on our Trust Center.

Vinny maintains compliance with

Security and Compliance at Vinny

Vinny maintains a SOC 2 Type II attestation and an ISO 27001 compliance certification. Our SOC 2 Type II report and ISO 27001 certificate are available on our Trust Center.

Vinny maintains compliance with

Security and Compliance at Vinny

Vinny maintains a SOC 2 Type II attestation and an ISO 27001 compliance certification. Our SOC 2 Type II report and ISO 27001 certificate are available on our Trust Center.

Vinny maintains compliance with

Data Protection

Data Protection

Data at Rest

All datastores containing customer data are encrypted at rest. For our most sensitive data, field-level encryption is applied before it reaches the database, meaning neither physical nor logical database access is enough to read it.

Data at Rest

All datastores containing customer data are encrypted at rest. For our most sensitive data, field-level encryption is applied before it reaches the database, meaning neither physical nor logical database access is enough to read it.

Data in Transit

All data in transit is protected using TLS 1.2 or higher, with HSTS enforced to prevent protocol downgrade attacks. TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Data in Transit

All data in transit is protected using TLS 1.2 or higher, with HSTS enforced to prevent protocol downgrade attacks. TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret Management

Encryption keys are managed via AWS Key Management Service (KMS), which stores key material in Hardware Security Modules (HSMs). This means no individual, including Amazon or Vinny employees can access key material directly; encryption and decryption happens exclusively through KMS APIs. Application secrets are encrypted at rest via AWS Secrets Manager and Parameter Store, with access strictly limited.

Secret Management

Encryption keys are managed via AWS Key Management Service (KMS), which stores key material in Hardware Security Modules (HSMs). This means no individual, including Amazon or Vinny employees can access key material directly; encryption and decryption happens exclusively through KMS APIs. Application secrets are encrypted at rest via AWS Secrets Manager and Parameter Store, with access strictly limited.

Product Security

Product Security

Vinny conducts annual penetration testing with Aikido, a leading firm specialising in GraphQL security. All product and infrastructure components are in scope, with full source code access provided to maximize coverage and effectiveness.

Additionally, we run daily internal pen tests to monitor performance and security continuously.

Summary reports are available in our Trust Center.

Penetration Testing

Vinny conducts annual penetration testing with Aikido, a leading firm specialising in GraphQL security. All product and infrastructure components are in scope, with full source code access provided to maximize coverage and effectiveness.

Additionally, we run daily internal pen tests to monitor performance and security continuously.

Summary reports are available in our Trust Center.

Penetration Testing

Vulnerability Scanning

Vulnerability Scanning

Static analysis (SAST) testing of code during pull requests and on an ongoing basis

Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain

Malicious dependency scanning to prevent the introduction of malware into our software supply chain

Dynamic analysis (DAST) of running applications

Network vulnerability scanning on a period basis

External attack surface management (EASM) continuously running to discover new external-facing assets

Static analysis (SAST) testing of code during pull requests and on an ongoing basis

Malicious dependency scanning to prevent the introduction of malware into our software supply chain

Network vulnerability scanning on a period basis

External attack surface management (EASM) continuously running to discover new external-facing assets

Dynamic analysis (DAST) of running applications

Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain

Enterprise Security

Enterprise Security

Endpoint protection

All corporate devices are centrally managed with MDM software and anti-malware protection, enforcing secure configurations including disk encryption, screen lock, and automatic software updates. Endpoint security alerts are monitored 24/7/365.

Secure remote access

Remote access to internal resources is secured via AWS VPN. Malware-blocking DNS servers provide additional protection for employees browsing the internet.

Integration & Partner Security

Vinny uses a risk-based approach to integration partner security. Factors which influence the inherent risk rating of a partner include:

Access to customer and corporate data

Integration with production environments

Potential damage to the Vinny or customer brands

Once the inherent risk rating has been determined, the security of the integration partner is evaluated in order to determine a residual risk rating and an approval decision for the vendor.

Security education

All employees complete security training at hire and annually. New employees also attend a mandatory live security onboarding session, and new engineers attend an additional session focused on secure coding practices. The security team shares regular threat briefings to keep employees informed of emerging risks and required actions.

Identity and access management

We enforce the use of phishing-resistant authentication factors, using WebAuthn exclusively wherever possible. Vinny employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.

Integration & Partner Security

Vinny uses a risk-based approach to integration partner security. Factors which influence the inherent risk rating of a partner include:

Access to customer and corporate data

Integration with production environments

Potential damage to the Vinny or customer brands

Once the inherent risk rating has been determined, the security of the integration partner is evaluated in order to determine a residual risk rating and an approval decision for the vendor.

Integration & Partner Security

Vinny uses a risk-based approach to integration partner security. Factors which influence the inherent risk rating of a partner include:

Access to customer and corporate data

Integration with production environments

Potential damage to the Vinny or customer brands

Once the inherent risk rating has been determined, the security of the integration partner is evaluated in order to determine a residual risk rating and an approval decision for the vendor.

Data Privacy

Data Privacy

At Vinny, data privacy is a first-class priority. We strive to be trustworthy stewards of all sensitive data.

Regulatory Compliance

Vinny evaluates updates to regulatory and emerging frameworks continuously to evolve our program.

Privacy Policy

Run your buildings at full speed

<10

Second Response Time

96%+

AI Resolution Rate

20%+

Void Period Reduction

Run your buildings at full speed

<10

Second Response Time

96%+

AI Resolution Rate

20%+

Void Period Reduction

Run your buildings at full speed

<10

Second Response Time

96%+

AI Resolution Rate

20%+

Void Period Reduction

Run your buildings at full speed

<10

Second Response Time

96%+

AI Resolution Rate

20%+

Void Period Reduction

Run your buildings at full speed

<10

Second Response Time

96%+

AI Resolution Rate

20%+

Void Period Reduction