Security, Privacy, and Compliance Spatial data can be some of the most sensitive in your organization. Data security is our top priority. Visit our Trust Center Private, secure, and compliant from day one. Built to meet enterprise data privacy standards Hosted on AWS, in our accounts or in yours Fully SOC2 and GDPR compliant Private, secure, and compliant from day one. Secure by design Security is not just a feature. It’s part of our engineering culture and infused into how we design and build our software, our internal systems, and our production environments. Wherobots is built from the ground up with the security of your data and your workloads in mind. Control-compute separation Wherobots’ cloud-native architecture provides strong separation between its control plane, and its multi-cloud and multi-region compute plane. The control plane is managed by Wherobots and runs in Wherobots’ AWS account, within a private Wherobots network. It is a cloud-hosted system that manages authentication, users, business logic, and access to the service via its web interface and APIs. Your data does not pass through nor is it stored in the control plane. The compute plane is serverless to users, fully managed by Wherobots, and is deployed to multiple cloud regions supported by Wherobots or a BYOC account. It powers customer workloads, each isolated from the cloud hypervisor up to create a trusted environment for your data, and privately connects to your cloud buckets and data sources. Saas Serverless BYOC Want to bring your own cloud account? Wherobots Cloud is serverless by default, but can also run its compute plane in your own cloud VPC in Bring-your-own-cloud-(account) deployments. If you’re interested, or have requirements for a BYOC deployment option, please contact us. Contact Us Infrastructure and network security Cloud providers Wherobots compute and control planes are currently hosted on AWS. By using AWS, Wherobots inherits all the physical and logical security and compliance features built into AWS’s datacenters, network, and infrastructure. The list of our current compute plane regions is available in our documentation. If you need compute presence close to your data in other cloud provider regions, please tell us by filling in this form. Networking The control plane and compute plane network infrastructure is managed by Wherobots. Wherobots maintains network isolation between customer workloads. Connectivity between a compute plane region and the control plane is secure, private, and encrypted. By default, Wherobots uses VPC Gateway endpoints to ensure connectivity between the compute plane and your Amazon S3 buckets is private and never leaves the AWS cloud network. Encryption All network traffic, including traffic between VMs within the compute plane1 and connections with private and public data sources, is encrypted in transit. Wherobots uses network attached storage with virtual machines and cloud object storage. When data is at rest, it is always encrypted using an encryption key provided and managed by a cloud provider (e.g. AMS KMS). Access control Wherobots prioritizes the security and integrity of customer data and security practices are integrated throughout all business operations. All employees and operators must use dedicated user accounts, and use Google SSO combined and MFA everywhere available. This reduces the risk of unauthorized access, prohibits credential sharing, limits elevated permissions effectively, and provides traceability of access. Only specific employees requiring data access for support purposes have such permissions, and all access is logged. User permissions and access are continuously reviewed to maintain alignment with current roles and access requirements. These reviews, conducted both manually and through automated compliance tools, swiftly identify and resolve any unnecessary or outdated access. Customers must follow robust password guidelines to ensure strong credentials are used to log into the Wherobots Cloud platform. Additionally, Wherobots offers SSO support via SAML, allowing customers to utilize their existing identity providers for secure, seamless authentication. Customers retain complete control over their configurations. Wherobots uses Identity and Access Management (IAM) cross-account roles to ensure granular, least privilege access to customer-owned cloud resources. Third-party audits Wherobots undergoes SOC 2 compliance audits and has obtained its SOC 2 Type 2 attestation. Penetration testing is performed regularly by an independent third-party. Any findings from the penetration testing are immediately investigated by Wherobots’ security and engineering teams, and remediated according to their severity. The latest penetration testing report can be shared on request. Email and DNS security Wherobots implements all currently available best practices for email security and spoofing prevention with DMARC and DKIM. Automated emails produced by Wherobots systems are sent via AWS SES or via Hubspot, both of which are explicitly authorized to send emails on our behalf. All domain name service zones for Wherobots domains are managed by AWS Route 53, inheriting the security and auditability capabilities of AWS services. Business continuity and disaster recovery Wherobots has an established Business Continuity and Disaster Recovery plan to ensure that both our business and our product offerings deliver high availability and resilience to our end users. All business data is securely stored and backed up by our service providers. All customer data and metadata is stored in version controlled S3 buckets with high availability and S3’s renowned extreme durability, and backed up in a separate AWS region. Backup and recovery procedures are frequently exercised to provide a sub-24h RTO. Wherobots runs regular business continuity and disaster recovery scenarios to plan for unforeseen events and test its disaster recovery procedures. These events include but are not limited to loss of key personnel, degradation of key infrastructure, and operational force majeure events. The remediations for these possible events are discussed annually. Corporate security Wherobots incorporates comprehensive technical and operational safeguards to protect your data and ensure uninterrupted service availability. We maintain transparency in our security practices, consistently aiming to surpass industry standards. All corporate devices are secured through Mobile Device Management (MDM), ensuring compliance with our security standards. Advanced malware and anti-virus software are deployed and regularly updated to counter evolving threats. Full disk encryption safeguards data stored on all corporate devices. Strong password policies and automatic screen locks further minimize unauthorized access risks. Employees complete security and privacy awareness training during onboarding and annually thereafter, ensuring adherence to current security best practices. All employees undergo thorough background checks. Our security team continuously monitors the cloud environment, supported by real-time threat protection tools and proactive incident response strategies. Cloud Security Posture Management (CSPM) tools continuously track for and respond to anomalies or unusual activities. Physical access to Wherobots offices is strictly controlled through a badge system, ensuring entry is limited to authorized personnel only. Responsible disclosure Security researchers are encouraged to responsibly disclose vulnerabilities and security issues to Wherobots’ security team at [email protected] with a working proof of concept. Wherobots does not have a bug bounty program at this time. 1 In AWS, Wherobots uses Amazon EC2 Nitro instances that encrypt data in transit between VMs Visit our Trust Center TABLE OF CONTENTS Infrastructure and network securityCloud providersNetworkingEncryptionAccess controlThird-party auditsEmail and DNS securityBusiness continuity and disaster recoveryCorporate securityResponsible disclosure