Our goal is to provide a secure environment, while also keeping our application’s performance at the highest quality to provide you with best overall user experience.
Epiphany uses Auth0 for authentication to facilitate industry-leading techniques for password management, encryption, storage, complexity, and reset.
Epiphany includes three user role levels to help you manage permissions and access throughout your team.
Individual projects in Epiphany can be configured to restrict access to specific users. Enforce your organization's data classification policy by leveraging project access control to restrict data visibility to a subset of users within your organization.
Epiphany utilizes industry-standard cloud infrastructure vendors to provide the its service. Epiphany’s infrastructure is managed through Amazon Web Services. The Epiphany web application is hosted in the servers are located in Oregon (US) on Amazon Web Services.
Amazon Web Services has been granted formal certification, attestation, and audit reports for ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, SOC 3, and more – the full list of compliance resources is available on the Amazon Web Services Security page.
All Epiphany employees have limited access to Epiphany infrastructure and systems and access is always provisioned on a minimum-necessary, least-privilege, basis. Access is only granted on a need-to-use basis, based on the responsibilities and duties of the employee.
Epiphany utilizes Sentry for application logging and monitoring to help diagnose and fix issues within the Epiphany web application. Application error logs are stored in Sentry for 30 days and are used to help investigate issues raised from automatic alarms raised via Sentry.
Epiphany utilizes industry-standard practices concerning the encryption of data when stored and while in transmission.
Your privacy is important to us, and so is being transparent about how we collect, use, and share your information.
In our Privacy Policy, we share what information we collect, how we use and store that data, and how you can access and control your information.