Security documentation

SOC-2 report

Our SOC 2 Report was generated by Moss Adams, a leading accounting and auditing firm, after conducting an in-depth review of our security, privacy, and confidentiality controls. A SOC 2 audit is a major undertaking that verifies that we meet strict security, confidentiality, and privacy standards in how we manage and protect customer data.

Assembled Inc. SOC 2 Type 2 Report 09-30-22.pdf

Pentesting report

We regularly engage independent cybersecurity firms to perform professional penetration tests of our systems. These controlled pentests systematically uncover and allow us to promptly address any vulnerabilities prior to exploitation. For our latest Pentest, we used Doyensec which is a highly regarded security firm focused exclusively on information security.

Doyensec_Assembled_Retesting_Q42022.pdf

Technical architecture details

Our Network Diagram maps how data flows through our infrastructure under strict security controls. We leverage technologies from leading vendors to build and operate enterprise-grade, secure systems. This architecture is operated by engineers with experience running secure systems at scale.

Assembled Network Diagram.pdf

Assist data flow diagram

The data flow diagram below shows how Customer Relationship Management (CRM) data flows through our systems for Assist-specific replies.

Assist Data Flow Diagram.png

Security exhibit

A comprehensive overview of all our security controls, procedures, and policies to give you complete transparency into how we operate securely.

1375ca13-4dad-4f92-9af0-22c9b7c19b9b_Assembled_Security_Exhibit.pdf

Privacy policy, terms of service, and other agreements

Privacy policy

Terms of service

Services agreement