Padlock

Security built into every layer

Protecting customer and consumer data is at the core of everything we do. Spade’s information security program is designed to meet or exceed industry standards, with comprehensive controls that keep your data private, protected, and secure.

Enriching billions of transactions for category-defining fintechs & Fortune 500 banks every month
Fis Grey
Citizens Grey
Stripe Logo
Cashapppay Grey
Featured

Data protection and encryption

Your data stays secure at every step — in transit, at rest, and in use.

Encryption At Every Layer

Encryption at every layer

All data is encrypted using industry-standard algorithms, both in transit and at rest.

Secure Infrastructure

Secure infrastructure

We leverage AWS’s cloud platform and its best-in-class controls to deploy our services confidently and safely.

SOC 2 Alignment

SOC 2 alignment

Spade’s data protection methods comply with SOC 2 standards to ensure the confidentiality and integrity of customer and company data.

Redundancy And Reliability
Redundancy And Reliability Layer 2

Redundancy and reliability

Our infrastructure is designed for resilience, ensuring continuity and protection even under unexpected conditions.

Security built into every line of code

Every product and feature at Spade is developed with security at its foundation.

Encryption Icon

Encryption at every layer

All data is encrypted using industry-standard algorithms, both in transit and at rest.

Shield Icon

Secure infrastructure

We leverage AWS’s cloud platform and its best-in-class controls to deploy our services confidently and safely.

Shield Icon 2

SOC 2 alignment

Spade’s data protection methods comply with SOC 2 standards to ensure the confidentiality and integrity of customer and company data.

Anchor Icon

Redundancy and reliability

Our infrastructure is designed for resilience, ensuring continuity and protection even under unexpected conditions.

Continuous testing and validation

Security isn’t static, it’s maintained through constant vigilance and testing.

Target Icon

Penetration testing

We conduct both internal and external penetration tests to identify and address potential vulnerabilities.

Magnifying Icon

Automated vulnerability scanning

Regular scans run across all systems before and after deployment to maintain compliance and protection.

List Icon

Change management reviews

All new systems are reviewed for security implications before going live in production.

Magnifying Icon 2

Independent audits

Third-party testing ensures our controls meet or exceed current security standards.

Trusted people, trusted processes

Security starts with people. Every Spade employee plays an active role in keeping customer data safe.

Briefcase Icon

Background checks

All employees are vetted before being granted access to any production system or data.

Controls Icon

Access controls

We enforce least-privilege access principles, ensuring only authorized personnel have system-level access.

Training Icon

Ongoing training

Employees participate in regular security training to stay ahead of emerging threats and attack vectors.

Culture Icon

Culture of responsibility

Security awareness is embedded into our daily operations, from onboarding to incident response.

Industry-recognized compliance standards

Soc Logo

SOC 2 Type II Certified

Wasp Icon

OWASP Top 10 Development Standards

Gdpr Icon

GDPR-Aligned Data Handling Practices

Padlock Icon Green

Report a security concern

To report an issue or ask about our security program, please contact our team at security@spade.com