1touch.io Trust Center
Lasting Partnerships Are Built on Trust
1touch.io ensures our customer data is rigorously protected in line with security, compliance, and privacy frameworks.
Information Security Program
We maintain an internal Information Security Program (ISP) that addresses both our products and our general business practices. The ISP ensures a secure environment for our employees, customers, systems, and the data we manage. Our ISP is designed to implement appropriate technical and organizational security measures covering our product environments and related company systems, including:
Certifications and Compliance
As part of our commitment to safeguarding customer data and maintaining excellence in security controls, 1touch.io holds industry-leading certifications:
SOC 2 Type 2 Compliance
1touch.io undergoes an annual SOC 2 Type 2 audit to ensure proper safeguards for customer data and to evaluate the effectiveness of security controls. Our SOC 2 Type 2 report is available upon request under a non-disclosure agreement (NDA).
ISO 27001 Certification
1touch.io is ISO 27001 certified, demonstrating our adherence to best practices for information security management systems (ISMS). This certification ensures we systematically manage risks related to the security of information assets.
Platform Security
As a cloud-native platform, 1touch.io provides scalable and secure solutions, incorporating:
Infrastructure & Subprocessors
To provide our customers with reliable services, 1touch.io partners with leading cloud providers for infrastructure hosting:
Sub-Processor | Storage Location | Purpose |
---|---|---|
Google Cloud Platform | USA | SaaS |
Coralogixg | USA | Centralized logging & analytics |
Sub-Processor | Storage Location | Purpose |
---|---|---|
Google Cloud Platform | USA | SaaS |
Coralogixg | USA | Centralized logging & analytics |
Network & Data Protection
As part of our commitment to safeguarding customer data and maintaining excellence in security controls, 1touch.io holds industry-leading certifications:
Network Security
- VPC-based architecture enforces strict segmentation and resource isolation.
- Firewall rules ensure that only trusted traffic can access 1touch.io environments.
Data Protection
- Encryption at rest using Customer-Managed Encryption Keys (CMEK) for enhanced control.
- Enforced TLS 1.2+ for all communications.
Security Audit & Incident Response
1touch.io maintains an extensive incident response framework, integrating:
Product Architecture
The 1touch.io platform is built with a multi-layered security architecture to ensure data integrity, privacy, and operational resilience. The platform consists of three primary deployment units:
Data Flow & Security Mechanisms
