Authorized Subprocessors
We believe in full transparency regarding who processes your data. Below is the current list of third-party service providers.
Last Updated: January 2026
| Name | Service Purpose | Data Region | Status |
|---|---|---|---|
AW AWS | Cloud Infrastructure (Compute, Storage, Networking) | US-East, US-West | Active |
AU Auth0 | Identity & Access Management | Global | Active |
OK Okta | Single Sign-On (SSO) | US | Active |
DA DataDog | Monitoring & Logging | US | Active |
PA PagerDuty | Incident Response & Alerting | US | Active |
SL Slack | Internal Communications | US | Active |
GI GitHub | Source Code Repository | US | Active |
ST Stripe | Payment Processing | US | Active |
This list is subject to change. Updates are communicated via our notification policy.
Vendor Due Diligence
Every subprocessor undergoes rigorous security validation.
Security Compliance
- SOC 2 Type II or ISO 27001 Certification
- Annual third-party penetration tests
- Data Processing Agreement (DPA) signed
Continuous Oversight
- Annual security review & risk assessment
- Continuous performance & uptime monitoring
- Incident response integration
Contact Us
