We build mission-critical software for healthcare, automotive, and regulated industries. Security isn't a checkbox for us — it's how we operate. Every tool, every process, every person on our team is oriented toward protecting the data and systems our partners trust us with.
Our security program is maintained by named security owners across leadership, backed by enterprise-grade tooling, and verified through quarterly internal control reviews.
As an embedded product studio, the software we co-create directly impacts our partners' security posture. We take that responsibility as seriously as our own.
Least-privilege access, MFA enforced across every system, project-scoped permissions, and quarterly access reviews. When team members rotate off your engagement, access is revoked within 24 hours.
Data encrypted in transit (TLS 1.2+) and at rest (AES-256). Full-disk encryption on all devices. No deprecated protocols. Secrets managed through dedicated tooling — never in code, never in chat.
Security is embedded in our SDLC: threat modeling for new features, mandatory peer code review, automated SAST/DAST, dependency scanning, and OWASP Top 10 coverage in security testing. Every code change is reviewed before merge.
Documented incident response plan with defined severity levels and response timelines. Partner notification within 48 hours of discovered incidents. Post-incident review and written report for every event.
Employment and identity verification for all team members in accordance with applicable Serbian and EU employment law. Security awareness training on day one and annually. HIPAA-specific training for healthcare engagements. Comprehensive onboarding and offboarding procedures with 24-hour access revocation SLA.
Third-party vendors assessed for security posture before engagement. Annual reviews of critical vendors. Contractual security obligations and incident notification requirements in place.
We invest in enterprise-grade security tooling so our team can focus on building, not worrying about gaps.
Security is everyone's responsibility at SpiceFactory — from leadership defining policy to every team member protecting the data they work with daily.
Sets security culture from the top. Signs all core policies, sponsors the compliance program, and ensures security investment is never deprioritized.
Maintains our policy framework, manages evidence collection, coordinates audits, and ensures every engagement meets our security standards.
Oversees secure SDLC practices, code review standards, and engineering team security training. Ensures security is part of every sprint.
Oversees operational compliance, tracks control implementation, manages recurring compliance tasks, and ensures nothing falls through the cracks between engagements.
Annual security awareness and OWASP Top 10 training. Peer code review with security checklist. HIPAA-specific training for healthcare projects. No access to production data without project assignment.
Trained on data minimization in interface design. No real user data in prototypes or design files. NDA-bound and background checked before accessing any partner materials.
Manage access scoping per engagement. Ensure security requirements are captured in project kickoff. Track compliance tasks alongside delivery milestones.
Security awareness trained. Handle prospect and partner data per our data handling policy. No access to engineering systems or partner codebases. Clean desk and device encryption enforced.
We maintain a complete policy framework covering information security, data protection, incident response, and operational compliance. All policies are signed by executive leadership, reviewed annually, and available to partners on request.
Information Security · Access Control · Password & Auth · Encryption · Acceptable Use
Change Management · Incident Response · BCP/DR · Vulnerability Mgmt · Risk Mgmt
Data Classification · Vendor Mgmt · Asset Mgmt · HIPAA Security · SDLC
Remote Work & BYOD · Security Training · Subprocessors · Privacy Policy
SpiceFactory embeds with your team as a product partner. Here's how security works throughout our partnership.
NDA and security addendum signed. BAA executed for healthcare engagements. Team members undergo background checks. Project-specific security requirements documented and agreed upon.
Access scoped to assigned team members only. All code changes peer-reviewed with security checklist. Automated security testing in CI/CD. No production data in development or testing environments.
When team members step on or off your engagement, access is provisioned or revoked within 24 hours. New members complete project-specific security orientation before accessing your systems.
All access revoked within 24 hours. Your data securely deleted or returned within 30 days per our data retention policy. Credentials rotated. Knowledge transfer completed. Written confirmation of data removal provided upon request.
Our security practices are mapped to recognized industry frameworks. This means your auditors and security teams can evaluate our posture against standards they already know.
| Framework | What We Cover | Status | Documentation |
|---|---|---|---|
| SOC 2 | Controls mapped to the 2022 AICPA Trust Services Criteria, focused on Security with applicable Availability, Confidentiality, Processing Integrity, and Privacy controls | Aligned | TSC mapping, policy framework, evidence collection |
| ISO 27001:2022 | Annex A controls coverage | Aligned | Full Annex A mapping, ISMS documentation |
| HIPAA | Business Associate obligations, PHI safeguards | Active Program | BAA template, security program, breach procedures |
| FDA 21 CFR Part 11 | Electronic records & signatures | Aligned | SDLC supports design controls and audit trails |
| Assessed against framework controls with continuous evidence collection. Documentation is available to partners under appropriate access controls. No third-party SOC 2 report is claimed here. | |||
Common questions from partners and prospects about our security practices.
We're happy to walk through our controls, provide documentation, or discuss specific compliance requirements with your security team.
Contact Our Security Team