Learn about Vantage’s security practices, such as read-only billing access, compliance, data protection, and secure cloud provider integrations.
ReadOnlyAccess
policy, but we’ve removed actions that would otherwise allow us to access sensitive information in databases, buckets, and certain services. Our CloudFormation template is open source and hosted publicly for transparency.
Does Vantage periodically perform penetration tests?
Does Vantage hold any security certifications, such as SOC 1, SOC 2, or ISO 27001?
In terms of application security, how does Vantage deal with security reports received from security researchers? In other words, does Vantage have a bug bounty program or a straightforward process to report security issues?
Does Vantage support 2FA, SSO, or any defensive options?
How is customers’ data protected, and who has access to Vantage data?
Do you have a list of third parties Vantage uses that explains what each third party is allowed to access and its purpose?
Do you have a security contact person in case of breaches?
Do you log access activities of Vantage’s employees who have access to the data?
Does Vantage store any information regarding cloud infrastructure in the database?
Does Vantage use fixed IP addresses when connecting to external providers, such as AWS or Azure?
54.87.66.45
3.95.43.133
54.162.3.72
44.199.143.63
3.218.103.23