Split Security Practices
To learn more about Split’s security practices, view our help documentation or download our Split Security Primer by clicking below.
Secure data encryption
Split employs SSL encryption in transit, with default communications handled over TLS 1.2 security. Split keys and secrets are stored using the Amazon AWS Key Management Service, and login tokens are salted and encrypted for increased security.
Split’s production servers are hosted in AWS and subject to all of Amazon’s cloud security protocols. Split’s policies provide limited access to its production environment. Separate staging and production environments are utilized, and main datastore backups occur daily.
Recurring security testing
A third party assesses the security of the Split web application semi annually. Split addresses any findings from this assessment according to the risk they pose to the security of the Split service.
You own your customer data
You have complete control over what data is sent back to Split. No user identifiable data is retained by default as sharing sensitive user data is not required to target features controlled by Split end users.
Two-factor authentication and single sign-on
Industry-standard access controls
Frequently Asked Questions
Is your data encrypted? Do you have a backup plan? How are passwords stored?
Find answers to our top questions.