Security
Chorus Security Standards, Best Practices, and Certifications
Enterprise-Level Security Standards. For Everyone.
We take security very seriously. Customer conversations are one of the most valuable assets for a business and must be treated with the utmost care. Chorus doesn't outsource or white-label any technology so your data isn't vulnerable to 3rd party breaches. We are also SOC II compliant (audited by Ernst & Young).
Chorus hosts its software on Amazon Web Services (AWS) and leverages Amazon facilities in the USA. Amazon provides an extensive list of compliance and regulatory assurances, including SOC 3, and ISO 27001. See Amazon's compliance and security documents for more detailed information.
All of Chorus’ servers are located within Chorus’ own virtual private cloud, and do not allow external connections from untrusted sources. Our software infrastructure is updated regularly with the latest security patches.
Data Security
Your data is treated with the highest security standards - any data, as well as any connections you make while accessing Chorus, are completely secure.
Application Security
Chorus develops its application by following security best practices like OWASP guidelines for secure web application development.
Secure Development Process
At Chorus, code development is done through a documented SDLC process which includes guidance on how code is tested, reviewed, and promoted to production. We use a foolproof process across the entire lifecycle which includes:
Corporate Security Standards
Security isn’t just about proofing one’s technology and infrastructure. It’s also about human behavior. Chorus takes multiple steps to ensure that elaborate security policies are maintained, communicated, and followed across the board — by employees and partners.