Security

Security at Morney

The Morney team value security and it forms one of the pillars of our platform. We are committed to deepening our knowledge and implementing policies to safeguard your assets (funds and data).

Product

We made sure to stick with the global best practices while creating our product.

Development Process
We work with industry best practices and security is a corner stone of our product design and testing. These include security design reviews, code reviews, unit & integration tests.

Vulnerability Scanning
We regularly update our servers, tools, libraries, and patching vulnerabilities as they are discovered. Our application, host, and network are automatically scanned.

Admin Controls
Team administrators can manage team-wide settings, including requiring single sign-on and two-factor authentication, managing integrations, and deactivating users.

Data Security

We utilize the highest compliance framework available for data security.

Encryption
All data in transit is encrypted. All passwords are hashed using bcrypt.

Secrets Management
Secrets are stored securely and never in source code. Access to our infrastructure and related services requires SSH and two-factor authentication when possible.

Monitoring and Logging
We are committed to making Morney highly available. Our infrastructure runs on fault-tolerant systems and backups are made frequently.

Collaboration

We work with trusted external partners who challenge our beliefs and theories to search for better outcomes for our customers.

Compliance
Morney is hosted on one of the a leading cloud provider with SOC 2 and SOC 3 security certifications.

Security Research
We welcome responsible security research and disclosure on our product and infrastructure. Potential vulnerabilities can be reported by emailing [email protected].