We build mission-critical software for partners in healthcare, automotive, and regulated industries. Our security program is designed to meet SOC 2 Type II, ISO 27001, HIPAA, and FDA 21 CFR Part 11 requirements.
As an embedded product studio, the software we co-create with our partners directly impacts their security posture. We take that responsibility as seriously as our own.
Least-privilege access, MFA enforced everywhere, project-scoped permissions, and quarterly access reviews. When team members rotate off your engagement, access is revoked within 24 hours.
Data encrypted in transit (TLS 1.2+) and at rest (AES-256). Full-disk encryption on all devices. No deprecated protocols. Secrets managed through dedicated tooling — never in code.
Security is embedded in our SDLC: threat modeling, peer code review, automated SAST/DAST, dependency scanning, and OWASP compliance. Every code change is reviewed before merge.
Documented incident response plan with defined severity levels and response timelines. Partner notification within 48 hours of confirmed incidents. Post-incident review for every event.
Background checks for all team members. Security awareness training on day one and annually. HIPAA-specific training for healthcare engagements. Comprehensive onboarding and offboarding procedures.
Third-party vendors assessed for security posture before engagement. Annual reviews of critical vendors. Contractual security obligations and incident notification requirements in place.
Our controls are mapped to industry-standard frameworks so your auditors and security teams can verify our posture efficiently.
| Framework | Scope | Status | Documentation |
|---|---|---|---|
| SOC 2 Type II | All five Trust Service Criteria | Aligned | Controls mapping, policies, evidence |
| ISO 27001:2022 | Annex A controls | Aligned | Full Annex A controls mapping |
| HIPAA | Business Associate obligations | Active | BAA template, security program, breach procedures |
| FDA 21 CFR Part 11 | Electronic records & signatures | Aligned | Compliance program, controls mapping, IEC 62304 |
SpiceFactory embeds with your team as a product partner. Here's how security works throughout our partnership.
NDA and security addendum signed. BAA executed for healthcare engagements. Team members undergo background checks. Project-specific security requirements documented and agreed upon.
Access scoped to assigned team members only. All code changes peer-reviewed with security checklist. Automated security testing in CI/CD. No production data in development or testing environments.
When team members step on or off your engagement, access is provisioned or revoked within 24 hours. New members complete project-specific security orientation before accessing your systems.
All access revoked. Your data securely deleted or returned. Credentials rotated. Knowledge transfer completed. Written confirmation of data removal provided upon request.
Common questions from partners and prospects about our security practices.
We're happy to walk through our controls, provide documentation, or discuss specific compliance requirements with your security team.
Contact Our Security Team