Skip to main content
All CollectionsSecurity & Compliance
CREE8 Inc. Security Practices
CREE8 Inc. Security Practices

CREE8 Security Practices and Compliance

Michael Taylor avatar
Written by Michael Taylor
Updated over a month ago

Introduction
At CREE8, security is a cornerstone of our mission to empower creators
globally. Our platform integrates advanced security measures to protect
user data and ensure compliance with the latest industry standards.


​Core Security Features
1. Data Encryption
- In Transit: TLS 1.2 and higher ensures secure data transmission between
users and our servers.
- At Rest: AES-256 encryption protects stored data on our cloud
infrastructure.


2. Access Controls
- Multi-Factor Authentication (MFA): Required for administrative and
privileged accounts.
- Role-Based Access Control (RBAC): Restricts access based on user roles
and responsibilities.


3. Cloud Infrastructure Security
- Hosted on AWS and GCP, providing robust security features, including
automatic DDoS protection and physical data center security.
- Continuous monitoring and automated alerts to detect and respond to
threats.


4. Compliance Standards
- SOC 2 Type II and ISO 27001 aligned processes to ensure operational and
data security.
- Compliant with GDPR, CCPA, and other global data privacy laws.


5. Incident Response & Monitoring
- A dedicated Incident Response Team (IRT) monitors the platform 24/7.
- Rapid mitigation processes to address identified threats or vulnerabilities.


6. Vulnerability Management
- Regular penetration testing and code reviews by certified third-party
vendors.
- Automated patch management ensures system integrity.

Commitment to Compliance
CREE8 adheres to globally recognized standards to meet and exceed user
expectations:
- SOC 2 Type II Certification: Annual audits by third-party evaluators ensure
we maintain high standards.
- GDPR Compliance: Protecting the data rights of European Union citizens.
- CCPA Compliance: Transparency and privacy for California-based users.
​Your Security, Our Priority
We are dedicated to:
- Protecting user data with industry-leading encryption.
- Providing transparency on our security practices.
- Continuously improving to address emerging threats.


​Contact Us

For more details, reach us at [email protected].
​

Did this answer your question?