Our compliance principles guide how we deliver our products.

Information security is at the center of everything we do—from safeguarding customer data to maintaining critical system availability.

Certificate icon

Cubist is SOC2 Type II-compliant

Our team is committed to regularly assessing and validating our information security practices, policies, procedures, and operations.

AICPA SOC iconSOC 2 TYPE II icon

Security

How we protect sensitive data and systems

Learn more about our comprehensive security approach.

Personnel

Personnel
Background Checks & Confidentiality

All personnel undergo background checks and sign confidentiality agreements.

Need-to-Know Access

Only vetted personnel with need-to-know are given access to customer resources.

Security Training

We provide regular security education about emerging threats and attack vectors.

Testing

Testing
Third-Party Audits

Our codebase regularly undergoes third-party audits and penetration testing.

Automated Security Tools

We run automated tools for dependency management, code analysis, and vulnerability scanning.

Continuous Security Testing

Our CI/CD pipelines control deployments into all of our testing environments and our production environment.

Development

Development
Best Practices

We follow modern best practices for secure software development and web application security.

Security Reviews

New products, tools, and services—and major changes to existing ones—undergo rigorous security reviews.

Multi-Party Approval

All releases to production systems require approval from multiple qualified individuals.

Infrastructure

Infrastructure
Isolated Environments

Our customer environments are isolated from one another, and we cryptographically isolate customer secrets.

Continuous Monitoring

We use tools to continuously monitor performance, health, and security characteristics of system resources.

Access Control

We strictly enforce least-privileged access control and multi-factor authentication.

Cubist logo

“Security isn’t just a checklist for us—it’s part of how we think, design, and operate as a team. We believe strong systems come from reducing assumptions—not just about users, but about ourselves. That means recognizing that many common failures aren’t technical—they’re human—and designing systems that can say “no” when people can’t. Our internal practices reflect what’s at stake for the teams who rely on us, and we take that responsibility seriously.”

Cubist Founders • Riad, Ann, Fraser, and Deian
Arrow icon

Principles

Our Compliance Principles

Rigor

Transparency

Stability

Our system reinforces these commitments.

Explore the security controls built directly into CubeSigner.

Go to Product Security