There is nothing more important than security and privacy at Growth Protocol. Security is embedded into everything we do — from how we design and build our products to how we operate our internal systems and support our customers.
Growth Protocol’s Security team is responsible for establishing security policies and controls, monitoring adherence to those controls, and demonstrating our security and compliance posture to external third-party auditors.
Access to systems and data is strictly limited to personnel with a legitimate business need. Permissions are granted based on the principle of least privilege.
We implement layered and comprehensive security controls to reduce risk and increase resilience against potential threats.
Security controls are applied uniformly across all systems, environments, and operational areas of the organization.
We iteratively refine our security controls to enhance effectiveness, improve auditability, and reduce operational friction over time.
Growth Protocol applies strong technical and organizational safeguards to protect customer data throughout its lifecycle.
All data stores containing customer data or other data deemed sensitive are encrypted at rest. Sensitive data is additionally protected using field-level encryption where appropriate.
Access to data stores follows a zero-trust policy and is strictly limited to users with a verified business need.
Growth Protocol uses TLS 1.2 or higher for all data transmitted over potentially insecure networks.
Server TLS keys and certificates are managed by AWS and deployed through Application Load Balancers.
Application secrets are encrypted and stored securely using GCP Secrets Manager and Vault. Access to secrets is strictly limited and continuously monitored
Encryption and access keys are regularly rotated to reduce risk and prevent unauthorized or malicious access.
Growth Protocol uses Auth0 to manage identity and access across our systems. We enforce the use of phishing-resistant authentication factors.
View real-time system availability and incident updates