Global access roles allow GetWhy admins to set role-based permission levels for each user account, and project-level access controls allow permission levels to be set for specific projects.
GetWhy enforces a password complexity standard, and credentials are stored using BCrypt with unique salts.
Account verification for users
Users are required to validate their accounts via a link provided in an automated e-mail.
We ensure high availability with automated and manual testing, production monitoring, logging and alerts, fast continuous deployments, and industry-standard cloud infrastructure.
Hosting and storage
GetWhy services and data are hosted in Amazon Web Services (AWS) facilities in the EU.
Data is encrypted while moving between us and the browser with Transport Level Security (TLS). At Rest: Your data only resides in the production environment encrypted with AES-256. In Transit: Network communication uses TLS, and it is encrypted and authenticated.
GetWhy uses third-party security tools to scan for vulnerabilities. Our engineers respond to issues raised. We have no vulnerabilities on the OWASP Top 10.
We perform independent third-party manual penetration testing at least once per year, and depending on the risk assessment also when we have bigger systems changes. Contact us for a copy of the latest report.
Our backup processes ensure data and information consistency with the highest standards. We use AWS backup solution for data stores that contain customer data. Data is automatically backed up every 15 minutes, and we keep daily backups for 14 days. On an application level, we store logs of activity on a centralised log solution based on AWS Elasticsearch, Kibana and Logstash. Logs are stored for up to 15 days.
Monitoring & incident response
Production alerts are captured and automatically escalated. Outside of office hours, our engineering team has a best-effort and escalation policy. Security and confidentiality incidents submitted to email@example.com or our in-app support chat will be resolved in accordance with the established incident policy.
Logging & audit trail
We log every user action performed in the system with a full audit trail.
We have a state-of-the-art agile software development lifecycle methodology and change management procedures. Our deployment method requires no downtime for the application.
GetWhy is compliant with the Information Security Management System ISO/IEC 27001 standard.
We have completed the Vendor Security Alliance (VSA) Core self-assessment questionnaire, contact us for a copy.
The most recent penetration test reported no vulnerabilities on the OWASP Top 10.
SSL Labs score
“A+“ on their SSL Server test.