10 KPIs Engineering Leaders Can Report to the Board GET THE EBOOK

Security & Compliance

Jellyfish takes security seriously to ensure customer data remains secure and confidential.

Request a Demo

Jellyfish Security

Jellyfish uses the NIST Cybersecurity Framework (CSF) as the basis for our security program. We regularly perform both vulnerability assessments and penetration tests with third party security auditors. In addition, Jellyfish has successfully completed an audited Service Organization Controls (SOC 2) Type 2 certification.

Our Security Measures

Organizational Security
& Personnel

Jellyfish has a strong security culture within the team and management. All Jellyfish personnel are screened prior to employment and receive security training on an annual basis.

Written Information
Security Policy (WISP)

Jellyfish has a rigorous set of policies that the organization follows to ensure consistent practice and to protect Jellyfish and its customers’ confidentiality.

Data Center & Network Security

The Jellyfish platform is hosted entirely within the Amazon Web Services (AWS) secure cloud. AWS aligns with various compliance standards. The Jellyfish Security Team has implemented rigorous network security controls, and has established robust monitoring and alerting for anomalies, unusual user behavior, performance, availability, and other issues to minimize the threat of a security incident.

Customer Data Security

All data is encrypted both in transit (using TLS 1.2+) and at rest (AES 256-bit).

Internal R&D Processes

Jellyfish’s Secure Software Development Life Cycle (S-SDLC) is designed to allow software to meet customer expectations while also having an appropriate level of security that adheres to security best practices. The company’s testing platform performs tests for quality assurance including ongoing vulnerability and penetration testing.

Identity & Access Management

Jellyfish has mature Identity and Access Management practices. Jellyfish follows a policy of least privilege and uses role-based access controls to manage employee access to company infrastructure, systems, and customer data. Access Control reviews are performed regularly by the Jellyfish Security Team.

Change Management

Jellyfish has an established methodology to manage changes to infrastructure and platform. All changes to any system or service are reviewed, approved, and well communicated. The rigorous change management process is designed to prevent unintended service disruptions and maintain the integrity of the services provided to customers.

Certification & Audits

Jellyfish has completed its SOC 2 Type 2 certification and is committed to participating in annual audits with an accredited auditor to maintain this distinction. In addition, Jellyfish performs regular third-party vulnerability and penetration tests of our infrastructure and systems.

SOC Compliance

As part of our security program, Jellyfish has defined and documented our security policies. Jellyfish can make our policies and documentation available to all customers and potential customers including: penetration testing reports, security policy documentation, and/or our SOC2 attestation report.

See how Jellyfish enables engineering performance and strategic alignment

See how Jellyfish enables engineering performance and strategic alignment