TRUST · SECURITY · PRIVACY

We don't ask you to take our word for it.

Vinny handles sensitive resident, leasing, and operational data every day. Security, privacy, and responsibility are built in — audited, certified, and verified by independent third parties.

VISIT TRUST CENTRE
view privacy policy
LIVE POSTURE
All systems operational
100% · 90 DAYS
SOC 2 Type II
AUDITED Q1/2026
ISO 27001
CERTIFIED · Q1/2026
Last pen test
AIKIDO · Q1 2026
TRUSTED BY LEADING LIVING OPERATORS
TRUSTED BY LEADING LIVING OPERATORS
TRUSTED BY LEADING LIVING OPERATORS
THE FOUNDATION
THE FOUNDATION

Four principles.
Applied without exception.

Four principles.
Applied without exception.

Our Security and Privacy team establishes policies and controls, monitors compliance, and validates posture with third-party auditors. These four principles anchor every decision; every policy traces back to one of them.

Our Security and Privacy team establishes policies and controls, monitors compliance, and validates posture with third-party auditors. These four principles anchor every decision; every policy traces back to one of them.

01 / 04

Need-to-know

Access is granted on a need-to-know basis, using the principle of least privilege.

02 / 04

Defense-in-depth

Security controls are layered so that no single failure compromises the system.

03 / 04

Applied consistently

Controls are enforced uniformly across the enterprise.

04 / 04

Continuously improved

Controls are refined to be more effective over time.

Verified by Vanta and Aikido Security

ISO 27001
ISO 27001
SOC 2 Type II
SOC 2 · TYPE II
GDPR EU
GDPR · EU
EU AI Act Logo
EU AI Act
in detail 01 / 04
in detail 01 / 04

Data protection

Data protection

Data at rest

All datastores containing customer data are encrypted at rest. For our most sensitive data, field-level encryption is applied before it reaches the database — neither physical nor logical database access is enough to read it.

Data in transit

All data in transit is protected using TLS 1.2 or higher, with HSTS enforced to prevent protocol downgrade attacks. TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret management

Encryption keys are managed via AWS Key Management Service (KMS), which stores key material in Hardware Security Modules (HSMs). This means no individual, including Amazon or Vinny employees can access key material directly; encryption and decryption happens exclusively through KMS APIs. Application secrets are encrypted at rest via AWS Secrets Manager and Parameter Store, with access strictly limited.

in detail 02 / 04
in detail 02 / 04

Product security

Product security

PENETRATION TESTING

Annual external pen tests with Aikido. Daily internal tests in between.

Vinny conducts annual penetration testing with Aikido, a leading firm specialising in GraphQL security. All product and infrastructure components are in scope, with full source code access provided to maximise coverage.

AnnualEXTERNAL PEN TEST
DailyINTERNAL PEN TESTS
100%SOURCE CODE IN SCOPE
VERIFIED BY
Vanta
Aikido

Vulnerability scanning

6 LAYERS · ALWAYS ON
SASTStatic analysis on every pull request and continuously runningSCASoftware composition analysis flags known supply-chain CVEs
MALICIOUS DEPENDENCYBlocks malware introduction via packagesDASTDynamic analysis of running applications
NETWORK SCANSPeriodic infrastructure-level scanningEASMExternal attack surface management, continuously running
in detail 03 / 04
in detail 03 / 04

Enterprise security

Enterprise security

Endpoint protection

All corporate devices are centrally managed with MDM and anti-malware. Disk encryption, screen lock, and automatic updates are enforced. Endpoint security alerts are monitored 24/7/365.

Secure remote access

Remote access to internal resources is secured via AWS VPN. Malware-blocking DNS servers provide additional protection for employees browsing the internet.

Security education

All employees complete security training at hire and annually. New engineers attend an additional session on secure coding. The security team shares regular threat briefings.

Identity & access

Phishing-resistant authentication is enforced — WebAuthn exclusively wherever possible. Access is granted by role and automatically deprovisioned upon termination.

integration & partner security
integration & partner security

A risk-based approach

A risk-based approach

Each partner is rated for inherent risk, then evaluated for security controls. The residual rating drives an explicit approval decision before integration.

Each partner is rated for inherent risk, then evaluated for security controls. The residual rating drives an explicit approval decision before integration.

INHERENT RISK INPUTS
Access to customer & corporate data
Integration with production environments
Potential brand damage to Vinny or customers
CONTROLS EVALUATED
Security posture, attestations, contracts
OUTCOME
Residual risk rating · Approval decision
in detail 04 / 04
in detail 04 / 04

Data privacy

Data privacy

Regulatory compliance

Vinny continuously evaluates updates to regulatory and emerging frameworks to evolve the program.

Privacy policy

How Vinny collects, uses, and safeguards personal data.

READ POLICY

Data subject requests

Submit access, deletion, or portability requests through a single channel; responses within 30 days.

SUBMIT REQUEST

Run your buildings at full speed

Run your buildings at full speed

Run your buildings at full speed

Run your buildings at full speed

Run your buildings at full speed