SECURITY & TRUST

Data Security Is Our Priority

At allGood, we understand that trust is earned through transparency and proven security practices.
As a platform that helps marketing teams accelerate their revenue journey, we're committed to protecting your most valuable asset, your data, with enterprise-grade security controls and industry-leading compliance standards.

Infrastructure Security

  • AWS US-West-2 data residency with VPC isolation and security groups
  • AES-256 encryption at rest and TLS 1.2+ encryption in transit
  • Multi-factor authentication and role-based access with least privilege
  • 24/7 automated monitoring via AWS GuardDuty and CloudTrail
  • Network segmentation with zero-trust security model
  • Quarterly vulnerability scans with 30-day critical remediation commitment
  • Data Protection

  • Four-tier classification system with maximum protection for customer data
  • Data minimization ensuring AI models access only necessary information
  • Purpose limitation restricting processing to contracted services only
  • Customer data deletion within 60 days of contract termination
  • Comprehensive audit trails for all AI interactions and processing activities
  • Enterprise-grade vendor agreements with strict data handling requirements
  • Access Management

  • Single Sign-On (SSO) integrated with Google Workspace and WorkOS
  • Multi-Factor Authentication required for all production system access
  • Quarterly access reviews and documented approval processes
  • Automated deprovisioning within 24 hours of termination
  • Segregated duties with technical controls preventing single-person changes
  • Time-limited privileged sessions with comprehensive activity logging
  • Incident Response

  • 24/7 monitoring with automated alerting and dedicated response team
  • Customer notification within 24 hours of confirmed security incidents
  • Tiered response times from 3 hours (critical) to 1 business day (general)
  • GDPR-compliant 72-hour regulatory breach notification procedures
  • Comprehensive forensic analysis and remediation tracking
  • Public transparency through real-time status page at status.allgoodhq.com
  • Business Continuity

  • Multi-availability zone deployment with automated failover
  • Daily automated backups with geographic separation
  • 8-hour Recovery Time and Recovery Point Objectives (RTO/RPO)
  • Annual disaster recovery testing with documented procedures
  • Distributed remote-first operations eliminate single points of failure
  • SaaS architecture with vendor-managed uptime guarantees
  • Vendor Management

  • Comprehensive security evaluations and background checks for all vendors
  • Data Processing Agreements and contractual controls with all processors
  • Annual vendor security reviews and ongoing risk assessments
  • 30-day advance notice for subprocessor changes
  • Public subprocessor transparency at trust.allgoodhq.com/subprocessors
  • Continuous monitoring and contract management across supply chain
  • Development Security

  • Mandatory peer review for all production changes
  • Security scanning integrated into CI/CD pipeline
  • Dependabot, SonarSource, and AWS security tools for vulnerability detection
  • OWASP-compliant secure coding practices
  • Regular security testing at development milestones
  • 90-day security patch deployment timeline
  • Employee Security

  • Annual security awareness training and comprehensive background screening
  • Non-disclosure agreements and strict code of conduct enforcement
  • Comprehensive remote work policies with endpoint protection
  • Apple Business Manager for centralized device management
  • FileVault encryption and XProtect anti-malware on all devices
  • Real-time security monitoring across all endpoints
  • Transparency

  • 17 comprehensive security policies with documented procedures for all operational areas
  • Regular policy reviews and updates with documentation available upon request
  • Annual SOC 2 Type II audits by certified public accounting firms
  • Quarterly internal compliance assessments and control testing
  • Annual third-party penetration testing and security assessments
  • Continuous security posture improvements and enhancements
  • Contact & Support

  • Dedicated security team available at security@allgoodhq.com with 24-hour response time
  • Compliance team provides detailed documentation and questionnaire support
  • We take security seriously. If you discover a security vulnerability, please report it to security@allgoodhq.com
  • This security overview represents our current practices as of June 2025. We continuously evolve our security posture to address emerging threats and maintain the highest standards of data protection. For the most up-to-date information or specific compliance documentation, please contact our security team.

    Compliance

    SOC 2 Type II

    Status: Audited Anually

    allGood maintains SOC 2 Type II certification with annual third-party audits conducted by Johanson LLP. Our 2025 audit is currently in progress with results expected Q3 2025.

    ISO 27001 Alignment

    Status: Implementation in Progress

    We're implementing ISO 27001 controls with a target internal audit completion by Q4 2025, demonstrating our commitment to international information security standards.

    GDPR

    Status: Fully Compliant

    Complete GDPR compliance program including Data Processing Agreements (DPA), Standard Contractual Clauses, and comprehensive data subject rights procedures.