|Trust Center
Request Access
SOC 2 Type II Audited · 2025

Security & Trust

Security and privacy are built into Altruist from the ground up. Review our security controls, compliance posture, and authorized subprocessors below.

All Systems Operational

29 of 29 controls passing

SIPC Protected + Excess Coverage

Securities in your brokerage account are protected up to $500,000 through SIPC membership. Additional coverage of $40M per account is provided through Lloyd’s of London underwriters (aggregate limit $150M).

FDIC-Insured Cash Sweep

Uninvested cash automatically sweeps into FDIC-insured bank accounts, providing up to $250,000 in coverage per depositor, per bank.

Asset Protection Guarantee

Altruist will cover losses resulting from unauthorized activity in your account. See our Asset Protection Guarantee at altruist.com/legal/asset-protection-guarantee for full terms.

SOC 2 Type II Audited

Independently examined by an AICPA-accredited auditor. Our controls covering security, availability, and confidentiality are reviewed annually and the full report is available upon request.

Firm-Level Data Isolation

Your client data is isolated at the firm level and never shared across accounts or commingled with other firms’ data. Access controls are reviewed annually.

End-to-End Encryption

All data is encrypted with TLS 1.2+ in transit and AES-256 at rest. Annual third-party penetration testing and continuous intrusion detection are in place.

Security Controls

Access Control

Multi-Factor Authentication (MFA) Enforcement

Systems are configured to authenticate users via a unique user account, MFA, and minimum password requirements or SSH keys prior to granting system access.

Role-Based Access Control (RBAC)

Predefined security groups are used to assign role-based access privileges and segregate access to in-scope systems and data.

Privileged Access Restrictions

Administrative access privileges to in-scope systems are restricted to user accounts accessible only by authorized personnel.

Access Request & Manager Approval Workflow

Internal user access requests are documented in an automated ticketing system and require manager approval prior to access being granted.

Employee Termination Access Revocation

Termination checklists are completed and system access is revoked for all employees as a component of the termination process.

Quarterly Privileged Access Reviews

User access reviews, including privileged access, are performed by management on a quarterly basis to ensure access is restricted to authorized personnel.

Data Security

Encryption in Transit (TLS)

Web servers use TLS > 1.2 encryption for all web communication sessions. Unencrypted HTTP connections are rejected.

Endpoint Detection & Response (EDR)

An EDR application is installed on all entity-owned workstations to detect and respond to cyber threats in real time.

Encryption at Rest (AES-256)

Production data is stored encrypted using AES-256-bit encryption.

Data Handling & Encryption Policy

Documented policies and procedures guide personnel in the handling and encryption of stored data across all systems.

Infrastructure

Annual Third-Party Penetration Testing

Penetration testing is performed by a third-party vendor annually.

Monthly Vulnerability Assessments

Automated vulnerability assessments are performed on a monthly or more frequent basis.

Intrusion Detection System (IDS)

An IDS is configured to report network events.

Availability

Monthly Capacity Planning Reviews

Engineering personnel review infrastructure and system capacity monthly. Planning is conducted to mitigate the effects of infrastructure or system changes on availability.

Real-Time Infrastructure Monitoring

Logging and monitoring software collects data from system infrastructure components and endpoints to monitor performance, security vulnerabilities, and resource utilization, with alerts for unusual activity.

Automated Daily Backups

An automated backup system performs scheduled backups of all production data on a daily basis.

Business Continuity & Disaster Recovery (BC/DR) Plan

BC/DR plans are in place to guide personnel in procedures to protect against disruptions caused by unexpected events.

Annual BC/DR Plan Testing

A documented BC/DR plan is tested by in-scope functional areas on an annual basis to validate recovery procedures.

Annual Backup Restore Testing

Backup data restore tests are performed by IT personnel at least annually to verify backup integrity and recovery capability.

Change Management

Source Code Access Restrictions

Access to modify production system source code is restricted to user accounts accessible only by authorized personnel.

Pull Request Review Enforcement

Version control software is configured to enforce pull request review by personnel other than the change author before merging changes into production.

Peer-Reviewed & Approved Change Process

Application and infrastructure changes are authorized, peer reviewed, tested, and approved prior to implementation in production.

Segregated Development & Production Environments

Development and test environments are strictly segregated from production environments. Production access requires explicit authorization.

CI/CD Deployment Notifications

CI/CD software is configured to notify engineering personnel when changes are merged to production.

Vendor Management

Annual Vendor Compliance Monitoring

Management performs monitoring activities for all third-party vendors annually to ensure compliance with Altruist's security requirements.

Vendor Access Requirements Policy

Vendor management policies specify access requirements for all vendors and business partners with access to Altruist systems.

Incident Response

Post-Incident Postmortem Analysis

A postmortem analysis is performed for all security incidents, covering impact analysis, resolution, lessons learned, and tracked action items.

Incident Response Program

A documented IR program defines roles, containment, remediation, operational restoration, communication protocols, and lessons learned processes.

Documented Incident Escalation Procedures

Documented escalation procedures guide personnel in identifying and reporting security failures, incidents, concerns, and other complaints.

Subprocessors & Vendors

The following third-party service providers may process client data on behalf of Altruist in connection with our brokerage and advisory services. This list reflects subservice organizations identified in Altruist's most recent SOC 2 Type II audit.

  • AWS

    Infrastructure

    Cloud infrastructure provider. Altruist Platform and Altruist Clearing are hosted entirely on AWS in the United States.

    United States

  • Datadog

    Monitoring & Observability

    Monitoring and analytics platform for infrastructure and application performance.

    United States

  • FIS (Fidelity Information Services)

    Books & Records

    Provides books and records services supporting the Altruist Platform.

    United States

  • Sterling

    Trading Services

    Provides trading services supporting order entry, transmission to market, clearing, and settlement.

    United States