Security Portal

Get access to this Security Portal
  • Review sensitive security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access

Overview

At Stoplight, we are steadfast in following a design-first approach in all that we do, and we recognize that proper security is a critical component of getting that design right for our customers the first time. Security and compliance are fundamental to your experience with the product, and Stoplight is committed to securing your data, eliminating vulnerabilities, and ensuring continuity of access.

Stoplight uses various industry-standard technologies and services to secure your data from unauthorized access, disclosure, use, and loss. In addition, all Stoplight employees undergo background checks before employment and are trained on security practices during company onboarding and annually throughout the year.

Stoplight uses the CIS controls framework to assess and evolve its security posture.

Our current CIS assessment score is: 86

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective< 12 Hours
See more
Get access to this Security Portal
  • Review sensitive security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access

Documents

Pentest Report
Security Whitepaper
CAIQ
Business Continuity Policy
General Incident Response Policy
Other Reports
Vulnerability Assessment Report
Acceptable Use Policy
Access Control Policy
Backup Policy
Data Classification Policy
Data Security Policy
Encryption Policy
Information Security Policy
Software Development Lifecycle
Penetration Testing

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Other Reports
Pentest Report
Security Whitepaper
See more

Data Security

Backups Enabled
Data Erasure
Encryption-at-rest
See more

App Security

Code Analysis
Credential Management
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
BC/DR
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

Data Loss Prevention
Firewall
Security Information and Event Management
See more

Corporate Security

Email Protection
Employee Training
HR Security
See more

Policies

Acceptable Use Policy
Access Control Policy
Backup Policy
See more

Security Grades

Qualys SSL Labs
Web Platform
A+
Powered BySafeBase Logo