Wippy Wippy
Overview Hub Docs GitHub Get Started

Security Practices

Last Updated: August 15, 2025

Overview

Security is integral to Wippy. This page describes the organizational, technical, and physical controls we apply to our platform and services.

1. Controls

  • Multi-tenant SaaS with logical separation of customer data via access lists and unique customer IDs
  • Infrastructure hosted on Amazon Web Services (AWS)

2. Audits

Continuous monitoring system designed to identify vulnerabilities, non-compliance, and misconfigurations.

3. Security Controls Framework

  • Centralized identity management with quarterly access reviews
  • Multi-factor authentication required for all staff members
  • Access and action logging with device type, IP addresses, and anomaly detection
  • Network protection using abnormality detection, firewalls, and TLS 1.2+ encryption
  • Cloud security posture management
  • Secure software development lifecycle with code scanning

Customer Responsibilities:

  • Data sharing and content submission control
  • AI-assisted content generation choices
  • Single Sign-On governance
  • Workspace access management

4. Intrusion Detection

24/7 managed detection and response partnerships monitoring endpoints, cloud infrastructure, and identities.

5. Security Logs

Immutable logging of security events. Logs cannot be deleted or modified by administrators.

6. Incident Management

Documented incident response plan reviewed annually. Customer notification occurs without undue delay of unauthorized data disclosure.

7. Data Encryption

  • AES-256 encryption for stored data
  • TLS 1.2+ for communications
  • Keys managed within AWS infrastructure with periodic rotation

8. Reliability and Business Continuity

  • Recovery target: 72 hours
  • Recovery point objective: 24 hours
  • Daily backups retained for 3+ months
  • Annual testing of recovery protocols

9. Data Deletion

Customers can request deletion; processing takes up to 90 days. Automatic deletion occurs within 90 days of account termination if not requested otherwise.

10. Personnel Practices

  • Background checks during hiring
  • Mandatory security training during onboarding and annually
  • Non-Disclosure Agreements required
  • Role-based access with least privilege principles
  • Immediate access termination upon employment conclusion

11. Subprocessors

Third-party entities are reviewed for compliance with technical and organizational data protection standards.

12. Open Source Software

Vulnerability management program in place. Services contain no open-source requiring IP disclosure or redistribution.

Wippy by Spiral Scout

Product

Documentation Hub GitHub LLMs.txt

Company

Spiral Scout Blog Contact Careers

Legal

Privacy Policy Security Acceptable Use
© 2026 Spiral Scout LLC. All rights reserved.