Interfere Trust Center
At Interfere, security isn't just a feature - it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us - whether from our customers, their end users, or anyone who interacts with our organization with the utmost care and responsibility.
Compliance
Resources
Right to Object Policy
Information Technology Leadership Committee Charter
Information Security Policy
Access Control and Termination Policy
Baseline Hardening Policy
Controls
Source code access restricted and changes logged
Access control procedures
Quarterly user access reviews performed
Termination Access Revocation Checklist
Access Segmentation Between Customers and Environments
Data encrypted at rest
Data protection policy
Data transfers covered by approved safeguards
Cooperation agreements/data sharing frameworks
Data processing agreements executed and retained
Secure connection means utilized
Code of Conduct acknowledged by employees
Web application firewalls configuration
External Attack Surface Vulnerability Scanning & Remediation
Outsourced development security requirements managed
Anti-malware monitoring
Intrusion detection tool
Centralized Log Collection and Monitoring
SSL/TLS certificates for infrastructure
Monitoring, measurement, analysis and evaluation
Business continuity & disaster recovery plans documented and tested
Incident response and breach notification policy
Security incident logging and review
Breach notification communication
Internal GDPR compliance assessments performed
Binding corporate rules policy
Visitor sign-in, badging, and escort policy
Automated decision-making policy
Technology assets inventoried
Documented Vendor Management Program
Vendor termination
Vendor list
Vendor onboarding
Consent for processing captured via explicit opt-in mechanisms
Age verification and parental/guardian consent process enforced
Confidentiality Agreement acknowledged by employees
Security awareness training implemented
Employee handbook
List of newly hired employees & contractors
Background checks performed on employees
Records of Processing Activities (RoPA) maintained
Multi-availability zones
Asset register maintaining
Whisteblower mechanism maintained
Documentation available to internal and external users
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
Patch management process developed
Board/steering committee bylaws
Mobile Device Management (MDM) and BYOT
Board/steering commitee briefing
Production system hardening and baseline configuration management
Subprocessors
AnthropicAI & ML Services
CloudflareNetwork & Edge Security
M
Mastra.aiCloud Infrastructure & Platform Services