M&A data is among the most sensitive information a company handles. We built Atlantic M&A with enterprise-grade security from day one — not bolted on after the fact.
We are actively working toward SOC 2 Type II certification. Our infrastructure providers already hold SOC 2 Type II reports, and our application-level controls are designed to meet the Trust Services Criteria for Security, Availability, and Confidentiality.
All services run on Amazon Web Services with industry-leading physical and network security. AWS maintains SOC 2 Type II, ISO 27001, and FedRAMP certifications.
Every customer's data is strictly isolated at the database level. One tenant can never access another tenant's data, even in the event of an application-level vulnerability.
All data is encrypted in transit and at rest using industry-standard algorithms.
Enterprise-grade authentication with multiple sign-in options and mandatory multi-factor authentication.
Application secrets and API keys are never stored in code or environment files on disk.
AI features are powered by Anthropic's Claude via AWS Bedrock. Your data stays within the AWS environment and is never used to train models.
Fine-grained role-based permissions ensure users only see and modify what they're authorized to.
For customers outside the United States, we ensure data transfers comply with applicable regulations.
We carefully select infrastructure and service providers that maintain their own compliance certifications.
| Vendor | Certifications |
|---|---|
| Amazon Web Services | SOC 2 Type II, ISO 27001, FedRAMP, PCI DSS |
| Database Provider | SOC 2 Type II |
| AI Provider (via AWS) | SOC 2 Type II |
| Payment Processor | PCI DSS Level 1 |
| Authentication Provider | SOC 2 Type II (via AWS) |
| Source Control | SOC 2 Type II |
All code is reviewed before merging. Dependencies are monitored for vulnerabilities. Infrastructure is defined as code and version-controlled.
We maintain an incident response process for security events. Customers are notified within 72 hours of any confirmed breach affecting their data.
Production access is restricted to essential personnel only. All access requires MFA. We follow the principle of least privilege.
Customer data is retained only while the account is active. After termination, data is available for export for 30 days, then permanently deleted.
We monitor for security advisories affecting our dependencies and infrastructure. Critical patches are applied promptly.
Continuous database backups with point-in-time recovery. Infrastructure can be redeployed from code rapidly.
Need a security questionnaire completed (SIG, CAIQ, VSAQ), a Data Processing Agreement, or our Technical Security Addendum? Send us a message and we'll respond within one business day.