Dradis = Security

Built by security professionals. Tested by security professionals. No access to your data.

Security questionnaire

As a collaboration and reporting tool for cybersecurity teams, we recognize the importance of excellent security practices for such critical infrastructure. While we are a small team, we take security very seriously.

General security practices

Secure Development Lifecycle (SDL)

Data Sovereignty

Infrastructure

Encryption

Payments

Backups and recovery

FAQs

What user data do you collect?

By default none. We give the users the option to share with us limited telemetry data to help us improve the product. Learn about Usage analytics sharing.

More information on the type of data we collect on this website can be found in our Privacy Notice.

Will you fill out our security questionnaire?
Due to our small team size, we do not have the bandwidth to fill out security questionnaires for customers on our off-the-shelf plans. Please email us if you do not see one of your specific questions answered on this page and we can add it.
Do you maintain any security certifications such as SOC 2, ISO 27001, HIPAA or BAA?
While we'd eventually love to achieve these certifications, we don't hold them at this time. Please contact us if you'd like discuss working with us to get these certifications.
How do I report a potential vulnerability or security concern?

Please contact us through our Security Reports page.

If you have a discovery, please discreetly reach out to a member of the team for verification, vulnerability acceptance, and remediation timeline.

We believe in — and participate in — responsible disclosure. At this time we do not have a bug-bounty program in place.

How often is Dradis tested?

All of our users are security professionals and penetration testers. These users perform routine security assessments of the application as a part of their corporate security initiatives.

Review Security Reports page for the latest disclosures.

Any further questions?
Please contact us and we'll happily update this page.

Seven Strategies To Differentiate Your Cybersecurity Consultancy

You don’t need to reinvent the wheel to stand out from other cybersecurity consultancies. Often, it's about doing the simple things better, and clearly communicating what sets you apart.

  • Tell your story better
  • Improve your testimonials and case studies
  • Build strategic partnerships

Your email is kept private. We don't do the spam thing.