Security Hub

Get full access to this Security Hub
  • Review all security details
  • Unlock documents
  • Ask for more information
  • Reclaim access anytime
Had access before? Reclaim access

Overview

We are committed to providing secure products that support compliance and build trust. Use this Trust Center to learn about our security and trust initiatives.

Compliance

CCPA Logo
CCPA
Cyber Essentials Logo
Cyber Essentials
Cyber Essentials Plus Logo
Cyber Essentials Plus
GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
SOC 2 Logo
SOC 2
Get full access to this Security Hub
  • Review all security details
  • Unlock documents
  • Ask for more information
  • Reclaim access anytime
Had access before? Reclaim access

Documents

40 Documents
SIG Core
CAIQ
SOC 2
ISO 27001
Pentest Report
Network Diagram
Other Reports
Cyber Essentials
Cyber Essentials Plus
CAIQ Lite
HECVAT Full
SIG Lite
VSA Core
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
Information Security Policy
Network Security Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy
BC/DR

Risk Profile

Data Access LevelRestricted
Impact LevelSevere
Critical DependenceNo
See more

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

Network Diagram
Other Reports
Pentest Report
See more

Self-Assessments

CAIQ
CAIQ Lite
HECVAT Full
See more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Azure
BC/DR
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Threat Detection

Network Security

Firewall
IDS/IPS
Security Information and Event Management
See more

Corporate Security

Email Protection
Employee Training
Incident Response
See more

Security Grades

Qualys SSL Labs
https://abnormalsecurity.com/
A
https://portal.abnormalsecurity.com

Trust Center Updates

Spring4Shell Vulnerability Update

On Wednesday, March 30, 2022, a vulnerability within the Spring framework, specifically Spring Core and Spring Cloud Functions, was identified.

Abnormal has conducted a comprehensive assessment of this vulnerability and has determined that it does NOT use the affected versions of the Spring framework.

Published at 04/06/2022, 6:35 PM

Abnormal Update on Spring4Shell

Abnormal Security has conducted its assessment of the Spring4Shell vulnerability, and has determined that Abnormal systems are not impacted.

Published at 04/04/2022, 11:31 PM

Abnormal Update on Okta

Abnormal Security has conducted its assessment of the Okta security incident, and has validated with Okta that there was no impact to our internal employees, or issues with Customer Portal Okta logins.

Published at 03/22/2022, 5:58 PM

If you think you may have discovered a vulnerability, please send us a note.