Security & Trust
Security and privacy are built into Altruist from the ground up. Review our security controls, compliance posture, and authorized subprocessors below.
All Systems Operational
29 of 29 controls passing
SIPC Protected + Excess Coverage
Securities in your brokerage account are protected up to $500,000 through SIPC membership. Additional coverage of $40M per account is provided through Lloyd’s of London underwriters (aggregate limit $150M).
FDIC-Insured Cash Sweep
Uninvested cash automatically sweeps into FDIC-insured bank accounts, providing up to $250,000 in coverage per depositor, per bank.
Asset Protection Guarantee
Altruist will cover losses resulting from unauthorized activity in your account. See our Asset Protection Guarantee at altruist.com/legal/asset-protection-guarantee for full terms.
SOC 2 Type II Audited
Independently examined by an AICPA-accredited auditor. Our controls covering security, availability, and confidentiality are reviewed annually and the full report is available upon request.
Firm-Level Data Isolation
Your client data is isolated at the firm level and never shared across accounts or commingled with other firms’ data. Access controls are reviewed annually.
End-to-End Encryption
All data is encrypted with TLS 1.2+ in transit and AES-256 at rest. Annual third-party penetration testing and continuous intrusion detection are in place.
Security Controls
Access Control
Multi-Factor Authentication (MFA) Enforcement
Systems are configured to authenticate users via a unique user account, MFA, and minimum password requirements or SSH keys prior to granting system access.
Role-Based Access Control (RBAC)
Predefined security groups are used to assign role-based access privileges and segregate access to in-scope systems and data.
Privileged Access Restrictions
Administrative access privileges to in-scope systems are restricted to user accounts accessible only by authorized personnel.
Access Request & Manager Approval Workflow
Internal user access requests are documented in an automated ticketing system and require manager approval prior to access being granted.
Employee Termination Access Revocation
Termination checklists are completed and system access is revoked for all employees as a component of the termination process.
Quarterly Privileged Access Reviews
User access reviews, including privileged access, are performed by management on a quarterly basis to ensure access is restricted to authorized personnel.
Data Security
Encryption in Transit (TLS)
Web servers use TLS > 1.2 encryption for all web communication sessions. Unencrypted HTTP connections are rejected.
Endpoint Detection & Response (EDR)
An EDR application is installed on all entity-owned workstations to detect and respond to cyber threats in real time.
Encryption at Rest (AES-256)
Production data is stored encrypted using AES-256-bit encryption.
Data Handling & Encryption Policy
Documented policies and procedures guide personnel in the handling and encryption of stored data across all systems.
Infrastructure
Annual Third-Party Penetration Testing
Penetration testing is performed by a third-party vendor annually.
Monthly Vulnerability Assessments
Automated vulnerability assessments are performed on a monthly or more frequent basis.
Intrusion Detection System (IDS)
An IDS is configured to report network events.
Availability
Monthly Capacity Planning Reviews
Engineering personnel review infrastructure and system capacity monthly. Planning is conducted to mitigate the effects of infrastructure or system changes on availability.
Real-Time Infrastructure Monitoring
Logging and monitoring software collects data from system infrastructure components and endpoints to monitor performance, security vulnerabilities, and resource utilization, with alerts for unusual activity.
Automated Daily Backups
An automated backup system performs scheduled backups of all production data on a daily basis.
Business Continuity & Disaster Recovery (BC/DR) Plan
BC/DR plans are in place to guide personnel in procedures to protect against disruptions caused by unexpected events.
Annual BC/DR Plan Testing
A documented BC/DR plan is tested by in-scope functional areas on an annual basis to validate recovery procedures.
Annual Backup Restore Testing
Backup data restore tests are performed by IT personnel at least annually to verify backup integrity and recovery capability.
Change Management
Source Code Access Restrictions
Access to modify production system source code is restricted to user accounts accessible only by authorized personnel.
Pull Request Review Enforcement
Version control software is configured to enforce pull request review by personnel other than the change author before merging changes into production.
Peer-Reviewed & Approved Change Process
Application and infrastructure changes are authorized, peer reviewed, tested, and approved prior to implementation in production.
Segregated Development & Production Environments
Development and test environments are strictly segregated from production environments. Production access requires explicit authorization.
CI/CD Deployment Notifications
CI/CD software is configured to notify engineering personnel when changes are merged to production.
Vendor Management
Annual Vendor Compliance Monitoring
Management performs monitoring activities for all third-party vendors annually to ensure compliance with Altruist's security requirements.
Vendor Access Requirements Policy
Vendor management policies specify access requirements for all vendors and business partners with access to Altruist systems.
Incident Response
Post-Incident Postmortem Analysis
A postmortem analysis is performed for all security incidents, covering impact analysis, resolution, lessons learned, and tracked action items.
Incident Response Program
A documented IR program defines roles, containment, remediation, operational restoration, communication protocols, and lessons learned processes.
Documented Incident Escalation Procedures
Documented escalation procedures guide personnel in identifying and reporting security failures, incidents, concerns, and other complaints.
Subprocessors & Vendors
The following third-party service providers may process client data on behalf of Altruist in connection with our brokerage and advisory services. This list reflects subservice organizations identified in Altruist's most recent SOC 2 Type II audit.
| Subprocessor | Category | Description | Region |
|---|---|---|---|
| AWS | Infrastructure | Cloud infrastructure provider. Altruist Platform and Altruist Clearing are hosted entirely on AWS in the United States. | United States |
| Datadog | Monitoring & Observability | Monitoring and analytics platform for infrastructure and application performance. | United States |
| FIS (Fidelity Information Services) | Books & Records | Provides books and records services supporting the Altruist Platform. | United States |
| Sterling | Trading Services | Provides trading services supporting order entry, transmission to market, clearing, and settlement. | United States |
AWS
Infrastructure
Cloud infrastructure provider. Altruist Platform and Altruist Clearing are hosted entirely on AWS in the United States.
United States
Datadog
Monitoring & Observability
Monitoring and analytics platform for infrastructure and application performance.
United States
FIS (Fidelity Information Services)
Books & Records
Provides books and records services supporting the Altruist Platform.
United States
Sterling
Trading Services
Provides trading services supporting order entry, transmission to market, clearing, and settlement.
United States