SOC 2 Certification
Type II audit process, what it covers, and how to request our report
Your owners' financial data deserves protection that's been independently verified - not just claimed. Firm App is SOC 2 Type II certified, penetration tested annually with zero critical findings, and built on enterprise-grade infrastructure. We don't just say we're secure. We prove it.
See the live status of the Firm App application at: status.firm.app
Last Updated: July 5th, 2023
Firm App requires strong passwords, MFA (multi-factor authentication), and regular reviews of user access and user authorization levels to the Firm App system and to Primary Vendors (those such as hosting providers which have access to customer data, files, or source code).
By default, the Firm App system requires lengthy passwords, a variety of character types, and dis-allows the top 1,000+ most common passwords.
MFA and Single Sign-On (SSO) are also available for both our customer applications as well as their clients.
Data backup and recovery processes are critical for ensuring that data can be restored in the event of a disaster or other interruption. Firm App implements automated data backups stored under 99.999999999% (11 nines) durability, 256-bit AES encryption, and a physical separation of over 2,000 miles. All data is stored and transfered within the United States. Backup integrity is tested regularly under the disaster recovery plan drill.
Incident response planning is crucial for quickly and effectively addressing & documenting security incidents. As detailed in the Firm App SOC 2 Type 1 compliance report, Firm App has a documented incident response plan in place which includes regularly trains employees on how to respond to incidents and regularly testing the incident response plan.
Security awareness and training helps employees understand how to identify and prevent security threats. Firm App requires regular security training to developers including but not limited to the latest OWASP Top 10 Web Application Security Risks, regularly communicates security policies and procedures, and provides resources for developer to learn more about security best practices.
All employees also undergo mandatory annual Data Security training which covers topics like appropriate use of data, identifying data theft techniques such as phishing attacks, etc. The Firm App Employee Agreement includes data security & confidentiality clauses, guidelines for appropriate data usage, personal device limitations, etc.
Network security is critical for protecting against threats to the network and systems. The Firm App office network connection is protected by a firewall, Wi-Fi Protected Access Version 2 (WPA2) encryption, and automatic security updates.
The Firm App application and databases are hosted on Amazon AWS within the United States. Amazon AWS provides a wide range of accreditations and certifications including, but not limited to, SOC 1/ISAE 3402, SOC 2, SOC 3, FISMA, DIACAP, and FedRAMP, PCI DSS Level 1, ISO 9001, ISO 27001, ISO 27017, ISO 27018. Details of the AWS certifications can be found on the AWS Cloud Security page, but please note that they require a first-party, signed Non-Disclosure Agreement.
All types of data transmission are performed via secure connections. This includes browser connections, native app connections, server-to-database connections, remote management connections, log access, database backups and restoration, etc.
Firm App deploys a Zero Trust Environment to enhance its cyber-security posture and safeguard its valuable digital assets. This approach operates on the principle of "never trust, always verify," ensuring that access to resources is strictly controlled and granted only after rigorous authentication and authorization. Instead of relying on traditional perimeter-based security measures, this strategy enforces strict access controls for every user, device, and network connection. Each access request is subjected to rigorous authentication and authorization processes, reducing the likelihood of unauthorized access and data breaches.
In Firm App's zero trust environment, systems, employees, and users are granted access to resources on a need-to-know basis, with access rights regularly reviewed and adjusted as necessary. Continuous monitoring of user activities, device health, and network conditions allows for real-time detection and mitigation of potential threats. This security model adapts to emerging risks and promotes a proactive stance against both internal and external threats, offering a more robust defense compared to traditional security architectures.
Systems and application development security helps ensure that applications and systems are developed in a secure manner.
Secure coding practices are implemented including but not limited to:
All new code is manually and explicitly reviewed via a pull-request to ensure that secure coding practices are observed. This review includes:
At this time, only the CTO may approve pull requests into the master branch.
Firm App supports the latest two versions of all modern browsers including Chrome, Firefox, Microsoft Edge, and Safari. For security purposes, Internet Explorer 11 is not supported by Firm App since it is discontinued by Microsoft and no longer receives security updates.
The native Firm App apps for iPhone, iPad, and Android also support the latest two major versions of iOS and Android OS respectively.
Firm App does attempt to support previous versions of browsers and operating system within reason, but cannot guarantee compatibility.
By default, Firm App requires passwords to be at least 10 characters and must include an upper-case letter, a lower-case letter, and at least one number or symbol. Firm App does not enforce a max length. All authentication pages are designed to support the majority of password managers, but please contact the support team with questions or problems.
MFA is also available for all logins, and is based on the industry standard 24-byte TOTP SHA1 6-digit code. Passwords are not stored directly, Firm App only keeps a heavily salted hash using modern best-practices. For that reason, passwords may not be "recovered" but must be "reset".
Single sign-on is also available for interested parties. Please contact the support team at [email protected].
The Firm App office has physical security measures installed to help ensure that assets and facilities are protected from theft or damage. Firm App implements security controls such as an always-locked exterior door along with individually locked offices and work spaces. Surveillance cameras are installed and monitored on all entrances and exits.
The Firm App application code and databases are hosted in Amazon AWS within the United States regions. Learn more about the Amazon AWS Data Center Physical Security Measures.
Data encryption helps ensure that sensitive data is protected when transmitted or stored. Firm App implements encryption for data in transit and at rest, regularly monitors encryption usage, and implements secure key management practices.
For data transmitted between the user's browser or native app, TLS 1.3 or 1.2 is used. For security purposes, the following protocols are not enabled: TLS 1.0, TLS 1.1, SSLv2, SSLv3.
Database data, files, and backups are encrypted at rest using the industry standard AES-256 encryption algorithm.
Monitoring and logging helps detect and respond to security incidents. Firm App implements application monitoring for performance and security reasons. Suspicious activity such as repeatedly-failed login attempts, malicious inputs, repeatedly-failed attempts to view un-authorized data, sql injection, CSRF failures, etc, are logged and automatically reported. Logs include detailed information about the events but private information such as passwords are omitted for security purposes. The Incident Response Plan assigns responsibilities and identifies the required tasks for responding to an event.
Firm App also deploys an Intrusion Detection System (AWS GuardDuty) to monitor and report on databases, application servers, lambda functions, file storage & backups, etc.
Identity and access management involves managing user identities and permissions. Firm App implements requires the use of a password manager, MFA, and with minimum length and complexity requirements for authentication with Primary Vendors or other applications containing private company or client data. Firm App regularly reviews which employees have access to vendors, etc and whether that level of access is required.
To keep data security as a top priority, Firm App began its pursuit of SOC 2 compliance before the system went to market. In May 2023 Firm App engaged with a third-party BARR Advisory (a cloud-based cybersecurity & compliance consultant) to begin the SOC 2 Type 1 report. The SOC 2 Type 1 final report was completed in mid 2023 and is available upon request (email [email protected]).
Vendor management involves assessing and managing the risks posed by third-party vendors. Firm App regularly performs security assessments of third-party vendors, implements controls to mitigate identified risks, and has a documented process for managing vendor security. Part of the assessment is identifying Primary Vendors which are those who have any level of access to private company data or client data. Under Firm App policy, Primary Vendors require additional security requirements such as lengthy passwords, MFA, etc.
Business continuity planning involves preparing for potential business disruptions. Firm App has a documented business continuity plan in place which is available upon request. Firm App regularly reviews this plan to ensure employee awareness and to evaluate the effectiveness of the plan.
Firm App regularly performs vulnerability scanning, implements controls to address identified vulnerabilities depending on their severity, and regularly updates its testing process. Firm App uses an automated web and API vulnerability scanner to perform daily and weekly scans of the application servers and API. Issues are categorized as low, medium, high, or critical. By policy, critical issues are resolved within one week maximum, high issues within two weeks, and other issues within one month.
Firm App is committed to maintaining the security of its systems and networks and to protecting customer data. To achieve this goal, Firm App implements a comprehensive security configuration management process that includes:
Good data protection and privacy practices ensure software is secure and all customer data is protected. At a high-level, Firm App deploys these controls to ensure protection & privacy:
Ransomware prevention is important for preserving the privacy and safety of customer data along with the integrity of business processes that require access to the Firm App system. Firm App is designed from the ground-up with ransomware prevention in mind. Here are some examples:
Firm App abides by its documented Change Management Policy to ensure that changes are made with minimal disruption to the system and customers and to ensure that changes uphold stringent requirements for data protection and privacy. The Firm App Change Management Policy is summarized in three steps:
Firm App regularly reviews a variety of data sources to ensure the application is working effectively for customers and to ensure that new development is increasing the effectiveness. Reviewed data includes but is not limited to:
All vendors and associated services in use by Firm App are reviewed before implementation and then regularly to ensure they are up to date and in line with industry best practices. Vendors are reviewed on security policies, procedures, and controls via a thorough assessment of their system architecture and network security, as well as - if appropriate - a testing of their security controls to identify any areas of weakness or vulnerabilities that could be exploited by attackers.
If you have any additional questions, please message the Firm App support team at [email protected]
Any security questions or concerns may be reported to [email protected]
Our Whistleblower Policy is intended to encourage and enable employees and others to raise serious concerns internally so that we can address and correct inappropriate conduct and actions. It is the responsibility of all employees to report concerns about violations of our code of ethics or suspected violations of law or regulations that govern our operations. It is contrary to our values for anyone to retaliate against any employee or who in good faith reports an ethics violation, or a suspected violation of law, such as a complaint of discrimination, or suspected fraud, or suspected violation of any regulation. An employee who retaliates against someone who has reported a violation in good faith is subject to discipline up to and including termination of employment.
Mineral rights management involves exactly the kind of information attackers target: social security numbers, bank account details, payment histories, and physical addresses. A breach doesn't just damage reputation - it puts real people at real risk.
That's why we approach security as an ongoing investment, not a checklist. We pursue independent verification not because customers demand it (though many do), but because it holds us accountable to a standard higher than self-assessment.
Claims mean nothing without verification. Here's the independent testing and certification timeline that backs up our security posture.
Initial control design evaluation by BARR Advisory, an independent CPA firm specializing in technology audits.
OWASP methodology testing of all web interfaces. All findings remediated and re-validated within 30 days.
Both iOS and Android applications tested for OWASP Mobile Top 10 vulnerabilities. Zero critical findings.
6-month operational effectiveness testing completed. Unqualified (clean) opinion for Security and Availability criteria.
Security isn't a single feature - it's layers of protection working together.
AES-256 encryption protects data at rest. TLS 1.2/1.3 encrypts all data in transit. Legacy protocols are disabled. Your data is never stored or transmitted in plaintext.
Learn moreMandatory strong passwords, optional multi-factor authentication, SSO integration, and role-based permissions ensure only authorized users access what they should.
Learn moreBuilt on AWS with US-based data centers, multi-region redundancy, Cloudflare CDN and DDoS protection, and 99.999999999% durability for stored data.
Learn moreComplete audit trails capture who did what, when. Tamper-evident logs support compliance requirements and provide forensic capability if needed.
Learn moreWe believe in transparency. Qualified parties can request security documentation to support their vendor assessment process.
For security documentation requests, compliance questions, or to report a vulnerability:
[email protected]Typical response within 1 business day
Our team is ready to discuss your security requirements and share the documentation you need.