Security and Privacy at Wiiisdom
At Wiiisdom, we prioritize security and compliance. We implement and monitor policies and controls to ensure the safety of our customers’ and employees’ data.
Our approach is built on three key pillars:

Strict Access Control
Access is regulated based on the principle of least privilege.

Comprehensive Security Measures
Security controls are applied across all areas of the company.

Continuous Improvement
Policies and controls are iteratively developed to continuously enhance their effectiveness.

Security and Compliance at Wiiisdom
To demonstrate our commitment to security and compliance, we maintain a SOC2 Type II attestation. You can access our SOC2 Type II report in our Trust Center.

Wiiisdom contractually commits to comply with EU and US laws with GDPR, CCPA and applicable local data protection regulations.

Data Protection

Data at Rest
All data storage systems are encrypted at rest. Sensitive data undergoes additional encryption at the field level, ensuring that neither physical nor logical access to databases is sufficient to read the information.

Data in Transit
Wiiisdom employs TLS 1.2 or higher for all data transmissions over potentially insecure networks. We utilize features such as HSTS to enhance the security of our data in transit. Server TLS keys and certificates are managed by Azure and deployed via a CDN.

Secret Management
Encryption keys are managed through Azure Key Vault, which stores key material in Hardware Security Modules (HSMs). This prevents direct access by any individuals, including employees of Microsoft and Wiiisdom. The keys stored in HSMs are used for encryption and decryption via Microsoft APIs. Application secrets are encrypted and securely stored via Azure Key Vault, with access to these values strictly limited.

Product Security

Penetration Testing
Wiiisdom conducts penetration testing to ensure the security and resilience of its applications and systems. These tests are performed internally at least twice a year, following OWASP standards, including the Web Testing Guide v4.2 and ASVS.
The goal is to identify and assess vulnerabilities that could affect the integrity, confidentiality, and availability of data and services provided by Wiiisdom’s applications. Additionally, Wiiisdom engages a penetration testing firm to scan externally facing assets. More information and test results can be found on our Trust Center.

Vulnerability Scanning
Wiiisdom’s Secured Software Development Lifecycle (SSDLC) incorporates vulnerability analysis at multiple stages of the cycle.
We perform:
- Static Application Security Testing (SAST) at the pull request level.
- Software Composition Analysis to detect and address vulnerabilities in third-party dependencies.
- Dynamic Application Security Testing (DAST) on live applications.

Wiiisdom is SOC 2 Type II certified
