Our team of security experts have been in the application security business for over a decade. As such, we take security very seriously. The following processes have been implemented to ensure the security of the reshift application and infrastructure:
Regular application and infrastructure penetration testing
Code review for every code change
Threat modelling for every major feature
Encryption of data in flight and at rest
If you have any more questions, please email us at firstname.lastname@example.org!