Compliance & Security

Secure & Compliant by Default

Improve your security posture with SOC 2 compliance, automated reporting, and detailed activity logs.

Compliance & Auditing
Discover automated security defaults that far exceed industry standards.
Continuous Monitoring

Realtime monitoring and alerting of all production systems.

SOC 2 Type 2 Compliant

SOC 2 compliance across all 5 Trust Services Criteria

3rd Party Security Verification

Vulnerability scans and pen tests by independent security researchers.

Automated Security Reporting

Real-time security reports generated for each of your workspaces.

SOC 2 Type 2
Full SOC 2 attestation

SOC 2 Type 2 attestation across all 5 Trust Services Criteria by Ernst & Young

Continuous monitoring
100%
Audit hours reduced
25
Penetration Testing
Monthly 3rd Party Pen Testing & Vulnerability Scans

Userfront undergoes monthly vulnerability scans and penetration tests by 3rd-party security researchers.

“We wanted somebody to take away the churn of identity management from us.”

Roi A
Roi Avidan
Head of Technology at Pay.com.au
Security Automation
Automated Reporting

Real-time security reports generated for each of your workspaces.

Data protection & storage settings
Password hashing & configuration
Access token settings
Browser security configuration
System & network monitoring
Automated & pen test results
Governance & Auditing
Logging & Events

Keep a trail of all authentication and user actions to quickly diagnose problems.

"If you need a modern auth solution that is just the right amount of opinionated in order to make sure you follow good practices without needing to be a security engineer yourself, Userfront is the right tool for you."

James Boyce
Senior Engineer at Surreal
Security Monitoring
Continuous Monitoring

Realtime monitoring and alerting of SOC 2 controls for all production systems performed by Drata.

Continuously Monitored Controls
38
Continuously Monitored Trust Services Criteria
5