Skip to content

24/7 Software Data Privacy Trust Center:

Security is at the heart of what we do — helping our customers improve their security and compliance posture starts with our own.

Security and Compliance at 24/7 Software.

24/7 Software maintains a SOC 2 Type II attestation, Department of Homeland Security Safety Act Designation, and Data Privacy Framework Certification.  Additionally, 24/7 Software complies with many data privacy frameworks globally such as GDPR, the CCPA, and the Australian Privacy Act.  

Full report and certificates are available on our Trust Center.

24/7 Software maintains compliance with the following certifications; 


Data protection

24/7 Software's data privacy team has spent years building the highest levels of enterprise grade security.  Our customers care about the security of their venues, and we need to protect their data at all costs.  Here are some ways that we lead the market as the only vendor in our space to not only offer the credentials and certifications, but also the processes and policies to back it up.  

Encryption

All datastores with customer data, in addition to S3 buckets, are encrypted at rest. Sensitive collections and tables also use row-level encryption.

This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.

 

Data in transit

24/7 Software uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Secret Management

Encryption keys are managed via AWS Key Management System (KMS). KMS stores key material in Hardware Security Modules (HSMs), which prevents direct access by any individuals, including employees of Amazon and 24/7 Software. The keys stored in HSMs are used for encryption and decryption via Amazon’s KMS APIs.

Application secrets are encrypted and stored securely via AWS Secrets Manager and Parameter Store, and access to these values is strictly limited.


Enterprise product security 

24/7 Software's maintains enterprise grade software security compliance documentation, covering everything from Operations Security Policies, Business Continuity Plans, Quality Management Processes, and Information Security Policies.  These are key aspects to consider when choosing your venue operations technology partners.  

Penetration testing

24/7 Software engages with one of the best penetration testing consulting firms in the industry at least annually.  

We perform internal penetration tests to ensure the application is secure, and external tests to ensure the hosting infrastructure is secure.  

All areas of the 247 Software product and cloud infrastructure are in-scope for these assessments, and source code is fully available to the testers in order to maximize the effectiveness and coverage.

We make summary penetration test reports available via our Trust Center.

Vulnerability scanning

24/7 Software requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):

Static analysis (SAST) testing of code during pull requests and on an ongoing basis Software composition analysis (SCA) to identify known vulnerabilities in our software supply chain
Malicious dependency scanning to prevent the introduction of malware into our software supply chain Dynamic analysis (DAST) of running applications
Network vulnerability scanning on a
period basis
External attack surface management (EASM) continuously running to discover new external-facing assets