Security at Atlast
Security isn’t a feature. It’s part of how we build. Atlast is designed with security best practices in mind, and we continuously review our controls as the platform evolves. This page provides a high-level overview of how we protect customer and candidate data.
Access controls
- Access to the platform is role-based
- Internal access to production systems is restricted to authorised personnel
- Authentication and access activity are logged and monitored
Data protection
- Data is encrypted in transit using industry-standard protocols
- Data is stored on secure cloud infrastructure
- Access to customer data is limited to what is necessary to provide the service
Infrastructure & monitoring
- Atlast runs on established cloud infrastructure providers
- Systems are monitored for availability, performance and errors
- Issues are detected early through logging and alerting
Incident response
- Security incidents are handled according to internal response procedures
- Customers are notified of personal data breaches in line with applicable data protection law
- We continuously review incidents to improve our controls
Working with trusted partners
We carefully select third-party providers and require them to meet appropriate security and data protection standards.
A list of authorised subprocessors is available on our Trust & Data page.
Always improving
Security is not static. As Atlast grows, our security practices evolve with it to meet customer expectations and regulatory requirements.
Additional security information can be shared with customers where reasonably required.
Questions?
If you’d like to learn more about security at Atlast, reach out to us at: security@atlasthq.com