LogoLogo
HOMEAPPSBLOGDEVELOPERSGET A DEMO
  • Overview
    • Data
    • Middle's infrastructure
    • ENTERPRISE installations
    • Security
  • Workflows
    • Enable/disable an account
    • Connect or edit an app connection
    • Sync
      • Stored records
      • Sync history
    • Create or copy a workflow
    • Edit an existing workflow
    • Workflow steps
    • Workflow parameters
    • Triggers
  • User access
  • Performance
  • Data deletion
  • App development
    • Authentication
    • Credential storage
    • Sync records
    • Actions
    • Code packages
    • Upload scripts
    • Testing your apps
    • Versions
    • Monitor
  • Getting app credentials
    • ABC Ignite
    • Amazon S3
    • Clover
    • Emma
    • Erply
    • Facebook
    • fitDEGREE
    • Gmail
    • Google Sheets
    • HighLevel
    • Hubspot
    • Keap Max
    • Klaviyo
    • Lightspeed Retail
    • Mailchimp
    • Mindbody
    • OpenAI
    • Paramount Acceptance
    • Pike13
    • Salesforce
    • Shopify
    • Slack
    • Square
    • Vend
    • Xn
  • Guides
    • API limits
    • Building an API for Middle
    • Development best practices
Powered by GitBook
On this page
  • Policies
  • Software
  • Middle employees
  • Cloud security
  • Product security
  • Government
  • Certifications

Was this helpful?

  1. Overview

Security

Learn about Middle's security protocols

PreviousENTERPRISE installationsNextWorkflows

Last updated 6 months ago

Was this helpful?

Policies

We have the following security policies in place and can make them available upon request: Acceptable Use, Asset Management, Backup, Business Continuity Plan, Change Management, Code of Conduct, Cryptography, Data Classification, Data Deletion, Data Protection, Disaster Recovery Plan, Incident Response Plan, Information Security, Password, Physical Security, Responsible Disclosure, Risk Assessment, System Access Control, Vendor Management, and Vulnerability Management.

Software

We use to track compliance with our security policies.

Middle employees

All employees undergo a complete background check and sign an Employee Invention Assignment and Confidentiality Agreement when they join the company. We also track that all employees do the following:

  • Review and accept security policies

  • Install the agent to monitor their computers

    • The app checks several security-relevant settings, such as whether the hard drive is encrypted and if a password manager is installed.

  • Complete security training

Cloud security

Middle is hosted on Amazon Web Services (AWS). More information on their security can be found on the . We take the following security steps on AWS:

  • Data is encrypted at rest. It is also encrypted in transit with TLS/SSL.

  • Every customer’s data is stored on its own database instance separate from other customers’ data.

Product security

  • Passwords must be a minimum of eight characters and passwords on the Pwned password list cannot be used to create an account.

  • Middle monitors sessions by IP address and time.

  • Access can be granted at the account or sub-account level.

Government

Middle complies with CCPA and GDPR. Requests to review, correct, update, suppress, or delete personal information that Middle maintains about a person can be sent to privacy@middle.app.

Certifications

Middle is working towards SOC2 certification.

Vanta
Vanta
AWS Security website