Security and Availability FAQ 

The FAQ below answers various questions about AuditDashboard's security and availability posture.  If you require further information or have additional questions please review our security statement here or contact us at 


Q: How secure is the data stored in AuditDashboard? 

A:  Data inside AuditDashboard is protected using industry-standard, bank-level security protocols.  Here at AuditDashboard, we are serious about protecting both the integrity of our user’s data and guarding it against service disruptions.  To better understand what we are doing to meet these objectives, let’s take a look at the details.

  • End to End Secure Data Transmission:  AuditDashboard uses the same 256-bit SSL encryption that banks use.  This means that when a user uploads a file or enters information into AuditDashboard it is automatically encrypted. All files are encrypted in transit (when being uploaded or downloaded) and at rest (when sitting on our servers).  SSL Communications are limited to TLS 1.2 for all communications to and from the servers. 
  • Secure Data Storage & Backup: AuditDashboard uses world-class ISO 27001 and SSAE 16 (previously SAS 70 Type II) compliant data centers. Our facilities are subject to strict physical access protocols audited by independent firms annually. Our users don’t have to worry about backup with AuditDashboard.  We’ve got their backups!  In fact, we back up our user’s data daily, so they never have to think about it.
  • Integrated Security and Threat Detection: AuditDashboard employs cloud-based integrated security and threat detection services and monitors these in real-time. 
  • User Responsibility: To be absolutely secure we ask our users to be just as serious about security as we are! We think choosing AuditDashboard is a great first step but still, ask them to take the same precautions they would with other secure online transactions like e-commerce and banking.  This includes treating your passwords with great care, not leaving your computer logged into AuditDashboard when not using it, and not leaving your workstation unlocked when you are away from it.

Q: Does AuditDashboard Inc. have its internal controls audited? 

A: AuditDashboard completes an annual SOC 2 Type II audit each and every year.  AuditDashboard also engages a 3rd party to conduct various types of penetration and security testing services regularly. 


Q: How does AuditDashboard communicate outages or issues to customers?

A: AuditDashboard has a standard Security Incident Response Policy, as well as a formalized process for informing customers of availability or connectivity issues with our global infrastructure.   Our system status page - located at will be updated to reflect the currents status of any issues and will be updated regularly to keep customers informed.  AuditDashboard support may also choose to send out a support ticket email to affected customers via the Help Center. 

To obtain a copy of the Security Incident Response Policy (SIRP) customers of AuditDashboard can open a support ticket by emailing 


Q: Can I store my data anywhere?

A: Yes. AuditDashboard has data centers all over the world. Customers of AuditDashboard have the freedom to choose a geographic region that will adhere to any data residency requirements.  This also includes geographically redundant backup locations. 


Q: Does AuditDashboard have data retention policies? 

A: Yes. AuditDashboard can be set to retain data indefinitely or permanently delete trashed data after a period of time that can be defined by the firm.  For example, data can be permanently deleted after 90, 180, 365, or any other number of days after it has been deleted by the user. 


Q: Is AuditDashboard fast? 

A:  AuditDashboard is built on the Microsoft Azure Cloud platform and is designed using a cloud-first architecture.  This means AuditDashboard can take advantage of the elasticity of the cloud to scale up and out when customer usage demands it.  AuditDashboard also predictively scales customer databases during busy seasons. 


Have more questions? Submit a request


Article is closed for comments.