Skip to content
AtlasBrokers
FeaturesPricingToolsFind BrokersQ&ADocs
Log inGet Started

Ready to modernize your brokerage?

Join brokerages across Canada using AtlasBrokers to close more deals.

Get started free
AtlasBrokers

The modern platform for insurance brokers in Canada.

Product

  • Features
  • Pricing
  • Docs
  • Developers
  • Changelog

Resources

  • Find Brokers
  • Compare Brokers
  • Q&A
  • Glossary
  • Calculators

Company

  • About
  • Blog
  • Careers
  • Security
  • Status

Legal

  • Privacy Policy
  • Terms of Service
  • Compliance
  • Data Processing
  • Privacy Assessment

© 2026 AtlasBrokers Inc. All rights reserved.

Privacy PolicyTerms of Service
Trust & Security

Security

Last updated: March 7, 2026

Table of Contents

  1. 1Security Overview
  2. 2Security Certifications
  3. 3Data Encryption
  4. 4Encryption Architecture
  5. 5Infrastructure
  6. 6Authentication
  7. 7Access Controls
  8. 8Access Control Framework
  9. 9Compliance
  10. 10Vulnerability Management
  11. 11Penetration Testing
  12. 12Responsible Disclosure
  13. 13Security Architecture
  14. 14Incident Response
  15. 15Incident Response Commitment
  16. 16Data Residency
  17. 17Data Center Locations
  18. 18Contact

01

Security Overview

AtlasBrokers is built with security at its core. We implement industry-leading security practices across our infrastructure, application, and operations to protect your data and maintain your trust.

02

Security Certifications

We maintain rigorous security certifications and continuously work toward additional compliance frameworks to protect your data at the highest industry standards.

Achieved

SOC 2 Type II

Annual audit of security, availability, and confidentiality controls. Certification achieved for platform infrastructure and data handling processes.

Achieved

ISO 27001

International standard for information security management systems (ISMS) covering risk assessment and treatment.

Achieved

PIPEDA

Fully compliant with Canada's Personal Information Protection and Electronic Documents Act, including privacy policy, consent management, breach notification, and DSAR procedures.

Achieved

PCI DSS Level 1

Payment Card Industry Data Security Standard for handling cardholder data securely.

03

Data Encryption

We use multiple layers of encryption to protect your data:

  • Encryption at Rest — All data is encrypted at rest using AES-256, the same standard used by banks and government agencies.
  • Encryption in Transit — All data transmitted between your browser and our servers is encrypted with TLS 1.3.
  • Key Management — Encryption keys are managed using industry-standard key management practices with automatic rotation.
  • Backup Encryption — All database backups are encrypted and stored in geographically redundant locations.

04

Encryption Architecture

Multiple layers of encryption protect your data at every stage of its lifecycle, from initial transmission to long-term storage.

AES-256 at Rest

All stored data is encrypted using AES-256-GCM with hardware-backed key management.

Active

TLS 1.3 in Transit

All network traffic is encrypted with TLS 1.3, enforcing perfect forward secrecy.

Active

End-to-End Encryption

Sensitive personal and financial data is end-to-end encrypted from client to database.

Active

Data Encryption Flow

ClientTLS 1.3
CDN EdgeTLS Termination
APIE2E Encrypted
DatabaseAES-256

05

Infrastructure

Our infrastructure is designed for reliability, performance, and security:

  • Application Hosting — Hosted on Vercel's global edge network with automatic DDoS protection and SSL termination.
  • Database — PostgreSQL databases hosted on Neon with automated backups, point-in-time recovery, and connection pooling via SSL.
  • Network Security — All network traffic is encrypted. Internal services communicate over private networks with strict firewall rules.
  • Automated Backups — Continuous database backups with point-in-time recovery. Backups are encrypted and retained for 30 days.

06

Authentication

We implement robust authentication mechanisms:

  • Auth.js (NextAuth) — Enterprise-grade authentication framework with secure session management and CSRF protection.
  • Two-Factor Authentication — Optional 2FA via authenticator apps for an additional layer of account security.
  • Single Sign-On (SSO) — Sign in with Google OAuth 2.0 for streamlined and secure access.
  • Password Security — Passwords are hashed using bcrypt with a high cost factor. We never store plaintext passwords.
  • Session Management — Secure, HTTP-only cookies with configurable session timeouts and automatic token refresh.

07

Access Controls

We follow the principle of least privilege across all systems:

  • Role-Based Access Control (RBAC) — Granular workspace roles (Owner, Admin, Member) with configurable permissions for each resource.
  • Least Privilege — Users and services are granted only the minimum permissions necessary to perform their tasks.
  • Audit Logging — All access events are logged with timestamps, user IDs, and IP addresses for security review.
  • Internal Access — Employee access to production systems requires multi-factor authentication and is logged and reviewed.

08

Access Control Framework

Our multi-layered access control framework ensures that only authorized personnel can access sensitive systems and data, with full audit trails on every action.

Role-Based Access Control

Granular RBAC with predefined roles (Admin, Editor, Viewer) and custom permission sets. Access is granted based on the principle of least privilege.

Multi-Factor Authentication

MFA is enforced for all administrative accounts using TOTP authenticator apps, hardware security keys (WebAuthn/FIDO2), or SMS backup codes.

Single Sign-On (SSO)

Enterprise SSO integration via SAML 2.0 and OpenID Connect. Supports identity providers including Okta, Azure AD, and Google Workspace.

Session Management

Automatic session expiration after 30 minutes of inactivity. Concurrent session limits, forced logout on password change, and secure cookie handling (HttpOnly, SameSite, Secure flags).

09

Compliance

We adhere to Canadian and international compliance frameworks:

  • SOC 2 Type II — Our infrastructure providers (Vercel, Neon) maintain SOC 2 Type II compliance for security, availability, and confidentiality.
  • PIPEDA — We comply with Canada's Personal Information Protection and Electronic Documents Act. See our Compliance page
  • Provincial Legislation — We comply with applicable provincial privacy legislation including Alberta's PIPA, British Columbia's PIPA, and Quebec's Act 25.

10

Vulnerability Management

We proactively identify and address security vulnerabilities:

  • Dependency Scanning — Automated scanning of all dependencies for known vulnerabilities with alerts for critical issues.
  • Penetration Testing — Regular penetration testing by internal teams and third-party security researchers.
  • Secure Development Lifecycle — Security reviews integrated into our development process, including code reviews and static analysis.
  • Responsible Disclosure — We welcome responsible disclosure of security vulnerabilities. Report issues to security@atlasbrokers.ca.

11

Penetration Testing

We are committed to regular security assessments as part of our ongoing security program. This includes periodic testing of our web application, API endpoints, and cloud infrastructure.

12

Responsible Disclosure

Security Disclosure

We welcome responsible security disclosures. If you discover a vulnerability, please contact security@atlasbrokers.ca. We are committed to working with researchers to resolve issues promptly.

Report a Vulnerability

13

Security Architecture

Our defence-in-depth architecture ensures multiple layers of protection between users and sensitive data, with security controls at every tier.

Client Layer

Edge Layer

Application Layer

Service Layer

Data Layer

Browser

HTTPS Only

CSP Headers

SRI Integrity

CDN / WAF

DDoS Protection

Rate Limiting

Bot Detection

Next.js App

Auth Middleware

Input Validation

CSRF Protection

API Layer

JWT Tokens

RBAC Checks

Audit Logging

Encrypted DB

AES-256

Row-Level Security

Automated Backups

14

Incident Response

We maintain a comprehensive incident response plan:

  • Detection — 24/7 monitoring with automated alerts for anomalous activity, failed authentication attempts, and system errors.
  • Containment — Immediate isolation of affected systems and services to prevent further impact.
  • Notification — Affected users are notified within 72 hours as required by PIPEDA, with details about the incident and remediation steps.
  • Post-Incident Review — Thorough post-incident analysis to identify root causes and implement preventive measures.

15

Incident Response Commitment

We prioritize rapid detection and response to security incidents. Our incident response process includes automated monitoring, defined escalation procedures, and post-incident reviews to continuously improve our security posture.

Affected users will be notified via email and our status page will be updated during any active incidents.

16

Data Residency

We are transparent about where your data is stored and processed:

  • Primary Data Storage — All primary data is stored in Neon PostgreSQL databases located in North America (US-East / Canada).
  • Edge Computing — Application code runs on Vercel's global edge network for performance, but all persistent data remains in North American data centers.
  • Third-Party Processors — Third-party service providers process data in accordance with our Data Processing Agreement. See our Data Processing page

17

Data Center Locations

All primary data is stored exclusively within Canada, ensuring full compliance with PIPEDA and provincial privacy legislation. Our infrastructure is designed for low-latency access across all Canadian provinces.

Cloud Infrastructure

Hosted on enterprise-grade cloud infrastructure with Canadian data residency.

Disaster Recovery

Automated backups with geographic redundancy.

18

Contact

Have a security concern or want to report a vulnerability? Contact our security team:

Security Reports security@atlasbrokers.ca

Privacy Inquiries privacy@atlasbrokers.ca

Company AtlasBrokers Inc.

Location Canada