Transparency is the foundation of trust. Here you'll find everything you need to evaluate StoreHusk's security posture, compliance certifications, and data handling practices.
We maintain the industry's most rigorous compliance certifications, independently audited and continuously monitored.
Annual audit covering security, availability, processing integrity, confidentiality, and privacy trust service criteria.
β CurrentCertified information security management system with annual surveillance audits and triennial recertification.
β CurrentFull compliance with EU data protection regulations. DPA available. EU representative appointed.
β CompliantBusiness Associate Agreement available. Technical, administrative, and physical safeguards implemented.
β BAA AvailableFedRAMP Moderate authorized for U.S. federal government agencies and contractors.
β AuthorizedLevel 1 service provider compliance for payment card data handling and processing.
β Level 1Choose where your data lives. We operate data centers in multiple regions to meet your sovereignty requirements.
US-East, US-West, Canada
Ireland, Germany, Netherlands
Singapore, Tokyo, Sydney
London
A summary of our security architecture and operational practices.
Multi-tenant architecture with strict isolation. All infrastructure runs on SOC 2 certified cloud providers with redundant availability zones. Network segmentation, WAF, and DDoS protection at every edge.
Secure SDLC with mandatory code reviews, static analysis, and dynamic testing. Dependencies continuously scanned for vulnerabilities. Regular third-party penetration testing.
24/7 Security Operations Center with automated threat detection and response. All employee access requires MFA and is logged. Background checks for all personnel with data access.
Documented incident response plan with defined severity levels, escalation procedures, and communication protocols. Customers notified within 72 hours of confirmed data breaches.
Request our SOC 2 report, penetration test summary, or other security documentation under NDA.
Request documentation