Security is a top priority for Atomic Jolt and we've built a comprehensive security program to reflect our commitment. We have a formal, documented Information Security Management System which incorporates a number of Policies, Standards and Procedures to help protect our important data, including that of our customers, and our production systems.
External Security Attestations and Compliance
- Atomic Jolt has been SOC 2 Type 2 certified since August of 2022 and will maintain that certification via independent, third-party audits annually. Contact us for detailed reports and documentation.
- We follow Higher Education Community Vendor Assessment Toolkit ("HECVAT") guidelines


Atomic Search and Atomic Assessments are recognized on the Internet2 Cloud Scorecard for meeting the highest standards in security and trust.

Data Hosting
- All of our systems are hosted within Amazon Web Services ("AWS") secure data centers, which have been accredited under ISO 27001, SOC 1 and SOC 2, PCI Level 1, FISMA and Sarbanes-Oxley (SOX), to name just a few certifications.
Human Resources and Awareness
- Our employees and contractors undergo background checks prior to starting work with Atomic Jolt.
- Each individual must attend security awareness training upon hire and annually thereafter.
- All Atomic Jolt employees are required to comply with our policies relevant to their scope of work, including security and data privacy policies.
- Our standard work contract includes confidentiality clauses to protect our customers' data.
Access Control
- Atomic Jolt follows all best practices with access control, including the principle of least privilege when granting access to Atomic Jolt systems and customer data.
- We ensure that each individual has a unique username to ensure full accountability for actions.
- Our password security forces complexity and minimum character length in conjunction with the most recent National Institute of Standards and Technology ("NIST") recommendations.
- Multifactor authentication is enforced where technically supported.
- Privileged accounts are highly restricted and carry explicit guidelines for usage.
Endpoint Security
- Atomic Jolt laptops are locked automatically after 15 minutes of inactivity and employees are made aware of their responsibilities to protect access to the laptops.
- Our laptops are centrally-managed, with enforced security policies, limited administrative rights and centralized patching controls.
- Our laptops have centrally-managed commercial antivirus with tamper-protect installed.
- Local administrator rights are highly restricted.
Remote Access
- Atomic Jolt uses multifactor authentication with role-based access controls for VPN-based remote access sessions to production systems.
- Access to Atomic Jolt collaboration tools are restricted with single-sign on and multifactor authentication.
Network Security
- Atomic Jolt's production networks, all located in AWS, are secured through the combination of virtual firewalls and stateful AWS security groups, minimizing all permitted traffic to the least possible.
- All events related to administrative activities and access to customer data are centrally logged.
Vulnerability Management and Penetration Testing
- Atomic Jolt has robust policies and procedures to ensure that we regularly apply patches to our systems.
- We leverage centralized patch management and our vulnerability management team meets on a regular basis to keep a close eye on our patch statuses.
- Atomic Jolt external-facing sites are automatically scanned for vulnerabilities on a monthly basis.
- Internal vulnerability scanning is performed weekly using AWS Inspector.
- We have an automated compliance tool which constantly scans for any drift from our approved settings in AWS as well as our code management and project tools.
- Independent, third-party penetration testing is conducted no less often than annually on the production systems.
Secure Development
- Atomic Jolt's Secure Development Lifecycle requires automated Static Code Analysis prior to code moving into production.
- Our SDLC also requires developers to undergo annual secure developer training to address the latest threats.
- We require peer reviews/management approval/QA testing prior to code moving from our Development and Staging areas into Production.
Encryption at Rest
- Data at rest, including backup data, is AES 256-bit encrypted with encryption keys managed by AWS KMS.
- Our laptops have enforced full-disk encryption.
- Mobile Devices with access to Atomic Jolt data require Google Mobile Device Management policies to ensure that Atomic Jolt data remains separate and encrypted.
Encryption in Transit
- All communication between our systems and you (or your customers) is encrypted in transit via HTTPS using TLS v1.2 or later.
- Emails are automatically encrypted with TLS, where supported by the other party's server.
Backups
- Atomic Jolt production data is backed up automatically, leveraging AWS redundancy options to include cross-region replication.
- We perform annual Business Continuity and Disaster Recovery Testing walkthroughs.
Data Retention Policy
- Your data lives in our systems for as long as you ask us to keep it there.
- Our Data Retention Policy and Data Classification Policy govern the way we perform secure deletions for electronic data as well as physical media.
- Our destruction procedures follow US DOD 5220.22-M best practices.