By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyse site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Cookie Preferences

See Pendula in action!

Schedule your free demo with our Customer Success team.

By providing your information, you confirm that you agree to the storing and processing of your personal information by Pendula as described in the Privacy Collection Statement.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Security and privacy at Pendula

Pendula is committed to providing a secure platform for its customers to securely and privately communicate with their customers.

Pendula's team formulates policies, procedures, and controls, consistently oversees these controls, and fosters a company-wide commitment to delivering a secure platform for its customers.

Our security program is based on the following foundational principles:

01

Access must be based on a business need and only granted for the time it is required.

02

Security controls should be implemented and continuously monitored for their effectiveness and relevance. 

03

Security risk must be continuously assessed and the security program must respond to the emergence of new risks.

04

All of Pendula’s team are active participants in the security program and understand the need to support the program.

Security and Compliance at Pendula

Pendula maintains ISO 27001 and SOC2 Type 2 certifications. Both our ISO 27001 certificate and the SOC2 Type 2 report are available on our Trust Report page.

Read trust report

Data Protection

Data at rest

All data stores with customer data are encrypted at rest.

Data in transit

Pendula uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret management

Encryption keys are managed via AWS Key Management System (KMS). KMS stores key material in Hardware Security Modules (HSMs), which prevents direct access by any individuals, including employees of Pendula. The keys stored in HSMs are used for encryption and decryption via Amazon’s KMS APIs.

Application secrets are encrypted and stored securely via AWS Secrets Manager and Parameter Store, and access to these values is strictly limited.

Data at rest

All data stores with customer data are encrypted at rest.

Data in transit

Pendula uses TLS 1.2 or higher everywhere data is transmitted over public networks. Pendula also use features such as HSTS (HTTP Strict Transport Security) to maximise the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret management

Encryption keys are managed via AWS Key Management System (KMS). KMS stores key material in Hardware Security Modules (HSMs), which prevents direct access by any individuals, including employees of Amazon and Pendula. The keys stored in HSMs are used for encryption and decryption via Amazon’s KMS APIs.

Application secrets are encrypted and stored securely via Pulumi secrets, and access to these values is strictly limited. Databases and backups are encrypted using AWS KMS and parameter store.

Product Security

Penetration Testing

Pendula engages with one of the best penetration testing consulting firms in the industry at least annually. Pendula’s most recent penetration testing was conducted by CyberCX, a leading provider of Security Testing and Assurance services.

Pendula makes summary penetration test reports available via our Trust Report.

Read our trust report
Vulnerability Scanning

Security, Engineering and DevOps work together to ensure that Pendula is remediating vulnerabilities in the software and configurations within Pendula’s vulnerability management SLAs.

Pendula requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):

  • Static analysis (SAST) testing of code during pull requests and on an ongoing basis
  • Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain
  • External attack surface management (EASM) continuously running to discover new external-facing assets
  • Datadog CSPM to detect vulnerable configurations in any AWS accounts

Static analysis (SAST) testing of code during pull requests and on an ongoing basis.

Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain.

External attack surface management (EASM) continuously running to discover new external-facing assets.

Datadog CSPM to detect vulnerable configurations in any AWS accounts. 

Enterprise Security

Endpoint protection

All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates. Pendula uses device trust to enforce security standards on its end points before authentication to critical systems is allowed.

Secure remote access

Pendula secures remote access to internal resources using Teleport, an identity aware proxy that allows short term access to critical resources. All access is secure via Okta with device trust and is audited. 

Security education

Pendula provides comprehensive security training to all employees upon onboarding and annually through Knowbe4. All new employees attend a mandatory live onboarding session to understand Pendula’s key security principles. All engineers also attend mandatory developer security training.

Pendula’s security team shares regular security updates with the Pendula team and role specific updates for key departments.

Identity and access management

Pendula uses Okta to secure our identity and access management. Pendula enforces the use of phishing-resistant authentication factors such as device trust.Pendula employees are granted access to applications based on their role, and are deprovisioned upon termination of their employment.

Vendor security

Pendula uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:

  • Access to customer and corporate data
  • Integration with production environments
  • Potential damage to the Pendula brand

Once the inherent risk rating has been determined, the security of the vendor is evaluated in order to determine a residual risk rating and an approval decision for the vendor.

Data Privacy

At Pendula, data privacy is a first-class priority—we strive to be trustworthy stewards of all sensitive data and to minimise the privacy data used by Pendula.

Regulatory compliance

Pendula evaluates updates to regulatory and emerging frameworks continuously to evolve our program. Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to GDPR, UK-GDPR and HIPAA.

Regulatory compliance

Pendula maintains and reviews a list of security and privacy regulations that it is subject to including but not limited to GDPR, UK-GDPR and HIPAA.

Privacy Policy and DPA

View Pendula’s Privacy Policy
View our list of subprocessors
View our DPA