Big News! Split is now part of Harness. Learn more at Harness and read why we are excited by this move.

Trust & Security

Compliance at Split

Split is committed to achieving and maintaining the trust of our customers. Integral to this mission is providing a robust compliance program that ensures the confidentiality of your data.

SOC 2

Split’s Service Organization Control (SOC) Reports are certified by a third party and demonstrate how Split maintains key compliance controls and objectives. Split has obtained SOC 2 Type 2.

ISO 27001

ISO 27001 certification is an important milestone that further demonstrates Split’s dedication to best-in-class security and compliance while operating at a global scale.

ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) to standardize the process for establishing, implementing, operating, monitoring, reviewing, and maintaining an information security management system (ISMS).

Our Service Providers

Split holds its service providers, and specifically its data sub-processors, to similarly high standards. Data centers and managed service providers undergo regular third-party audits to verify their practices.

Split performs risk-based evaluations of the security measures of our vendors through its vendor management program. We review these security measures before we begin using a vendor. We re-evaluate vendor security measures on a recurring basis thereafter.

Review List of Data Subprocessors

Validating Compliance

To learn more about our security program at Split, please reference our Security Status Page below.

Split used independent third-parties to audit their security practices. These reviews occur at least annually and are conducted by a globally-respected audit and security firm. Any issues identified in these reports are processed by Split’s security team and addressed as necessary.

Split regularly performs vulnerability scans and third-party penetration tests on the Split network. We review and address findings from these activities to help maintain the security of our network.

Frequently Asked Questions

Is your data encrypted? Do you have a backup plan? How are passwords stored?

Find answers to our top questions.

Read the FAQ

Create Impact With Everything You Build

We’re excited to accompany you on your journey as you build faster, release safer, and launch impactful products.