Security & Trust Center

FundlyHub is built with security at its core. Explore our security posture, data protection & privacy practices.
security@fundlyhub.org
SOC 2 Aligned
Security Controls
Checking systems…

Encryption at rest (AES-256) & in transit (TLS 1.2+)

Active

Role-based access control (RBAC) with MFA

Active

24/7 real-time monitoring (Sentry + CloudWatch)

Active

Auth Risk Engine — rate limiting & anomaly detection

Active

Automated backups — RPO 1h / RTO 4h

Active

PCI DSS Level 1 via Stripe — no card data stored

Active
Explore

Deep-dive into our security practices, vendor transparency, and incident response process.

Security Practices

Infrastructure isolation, application controls, CI/CD pipeline security, and continuous monitoring.

24 controls active
Subprocessors

Full transparency on every third-party service that processes your data.

7 controls active
Incident Response

How to report vulnerabilities and our structured incident response process.

5 controls active
Request Security Documentation

Need more details for your security review or vendor assessment? We're happy to provide additional documentation.

Contact Us
Last updated: February 2026