At Riipen we take the protection of customer data extremely seriously. This Riipen Security Policy describes the organizational and technical measures Riipen implements platform wide designed to prevent unauthorized access, use, alteration or disclosure of customer data. The Riipen services operate on Amazon Web Services (“AWS”); this policy describes activities of Riipen within its instance on AWS unless otherwise specified. As you continue to learn more about Riipen we recommend you also review our Terms of Service and Privacy Policy.

Security Team

Our infrastructure and security team includes people who’ve played lead roles in designing, building, and operating highly secure Internet facing systems at companies ranging from startups to large public companies.

Best Practices

Incident Response Plan
  • We have implemented a formal procedure for security events and have educated all our staff on our policies.
  • When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
  • After a security event is fixed we write up a post-mortem analysis.
  • The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
  • Riipen will promptly notify you in writing upon verification of a security breach of the Riipen services that affects your data. Notification will describe the breach and the status of Riipen’s investigation.
Build Process Automation
  • We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes.
  • We typically deploy code multiple times a day, so we have high confidence that we can get a security fix out quickly when required.
Riipen Employees
  • Before joining Riipen, out team verifies an individual's education, previous employment, and conducts a criminal security check.
  • Riipen employs security and privacy teams which are focused on ensure Riipen both leads and follows the industry in data security.
  • All Riipen employees go through yearly security training which focuses on data security, social engineering, and other various security and privacy related matters.


  • All of our services run in the cloud. Riipen does not run our own routers, load balancers, DNS servers, or physical servers.
  • All of our services and data are hosted in AWS facilities in Canada and protected by AWS security, as described at Riipen services have been built with disaster recovery in mind.
  • All of our infrastructure is spread across 2 AWS data centers (availability zones) and will continue to work should any one of those data centers fail unexpectedly. Amazon does not disclose the location of its data centers. As such, Riipen builds on the physical security and environmental controls provided by AWS. See for details of AWS security infrastructure.
  • All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
  • Riipen uses a backup solution for datastores that contain customer data.
  • Riipen utilizes the AWS infrastructure monitoring tool “ThreatStack” to ensure compliance with AWS best practices and global security measures.
  • AWS's infrastructure has been audited and complies against the following applicable industry standards: CSA STAR, ISO 9001, ISO 27001, ISO 27017, ISO 27018, SOC1, SOC2, SOC3, PCI DSS 1, FERPA, FedRAMP, NIST 800-53, FIPS, FIPA, and PIPPEDA.


  • All customer data is stored in Canada.
  • Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
  • Each Riipen system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
  • Riipen engages certain subprocessors to process customer data. These subprocessors are listed at, as may be updated by Riipen from time to time.

Data Transfer

  • All data sent to or from Riipen is encrypted in transit using 256-bit encryption.
  • Our API and application endpoints are TLS/SSL only and score an “A+” rating on SSL Labs’ tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled.
  • We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.


  • Riipen is served 100% over HTTPS. Riipen runs a zero-trust corporate network.
  • There are no corporate resources or additional privileges from being on Riipen’s network.
  • We have two-factor authentication (2FA) and strong password policies on GitHub, Google, and AWS to ensure access to cloud services are protected.

Application Monitoring

  • On an application level, we produce audit logs for all activity, and ship logs to our service providers for analysis.
  • All access to Riipen applications is logged and audited.
  • All actions taken on production consoles or in the Riipen application are logged.

Certifications and Audits

Riipen allows customers to store their sensitive data and rely on Riipen to perform all of the underlying security and safeguards needed.


Riipen is GDPR certified by Instant EU GDPR Representative Ltd.


Riipen has received its SOC 2 Type I and Type II compliance certifications.

Contact us at to obtain the report.

Cloud Security Alliance - STAR registrant

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within cloud computing. One of the mechanisms the Cloud Security Alliance uses in pursuit of its mission is the Security, Trust, and Assurance Registry (STAR) - a free, publicly accessible registry that documents the security controls provided by various cloud computing offerings.

Read Riipen's STAR Consensus Assessment Initiative Questionnaire

SSAE16 / ISAE 3402 Type II Attestations

Riipen utilizes Amazon Web Services to host the complete Riipen environment. AWS undergoes annual independent audits for the following:

  • SOC 1
  • SOC 2
  • SOC 3

For further details, see AWS Compliance Programs.

Independent Audits

Riipen undergoes third-party penetration tests on an annual basis. All items found in the testing are addressed, mitigated, or remediated depending on the severity of the finding. A summary report is available to customers that are currently under contract with Riipen.

In addition to the yearly penetration testing, we have a continual third-party vulnerability scan performed that covers all of our IP space. This is meant to complement the annual penetration test and to ensure there are no gaps throughout the year.

In addition to internal and third-party security testing we commission directly, we encourage outside security researchers to test the Riipen application and report any vulnerabilities found to the Riipen Security Team, in accordance with our Responsible Disclosure Policy. Testing is performed by account owners or members authorized by the account owner to conduct testing. We will respond and fix vulnerabilities in accordance with our commitment to security and privacy, and will not take legal action against or terminate access to Riipen for those who discover and report security vulnerabilities.

Payment Processing

All payment instrument processing for purchase of the Riipen services is performed by Stripe. For more information on Stripe’s security practices, please see

Reliability and Uptime

  • Riipen strives to provide a 99.99% uptime
  • A Riipen engineer is on call 24/7 and automated monitoring systems are used to alter the on-call engineer to any site issues automatically
  • Users can monitor Riipen performance by visiting

Customer Responsibilities

  • Managing your own user accounts and roles from within the Riipen services.
  • Compliance with the terms of your services agreement with Riipen, including with respect to compliance with laws.
  • Promptly notifying Riipen if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the Riipen services or your account.
  • You may not perform any security penetration tests or security assessment activities without the express advance written consent of Riipen.

Effective Starting: September 23rd, 2019

Riipen and our third party partners, such as our advertising and analytics partners, use various technologies to collect information, such as cookies and web beacons.

What types of technologies do we use?

We use cookies, web beacons and other technologies to improve and customize our products and websites (“the Services”) and your experience; to allow you to access and use the Services without re-entering your username or password; to understand usage of our Services and the interests of our customers; to determine whether an email has been opened and acted upon; and to present you with advertising relevant to your interests.

How do we use them?

  • Where strictly necessary.  These cookies and other technologies are essential in order to enable the Services to provide the feature you have requested, such as remembering you have logged in.
  • For functionality.  These cookies and similar technologies remember choices you make such as language or search parameters. We use these cookies to provide you with an experience more appropriate with your selections and to make your use of the Services more tailored.
  • For performance and analytics.  These cookies and similar technologies collect information on how users interact with the Services and enable us to improve how the Services operate. For example, we use Google Analytics cookies to help us understand how visitors arrive at and browse our products and website to identify areas for improvement such as navigation, user experience, and marketing campaigns.
  • Targeting Cookies or Advertising Cookies.  These cookies collect information about your browsing habits in order to make advertising relevant to you and your interests. They remember the websites you have visited and that information is shared with other parties such as advertising technology service providers and advertisers.
  • Social media cookies. These cookies are used when you share information using a social media sharing button or “like” button on our websites or you link your account or engage with our content on or through a social media site. The social network will record that you have done this. This information may be linked to targeting/advertising activities.

How can you opt-out?

To opt-out of our use of cookies, you can instruct your browser, by changing its options, to stop accepting cookies or to prompt you before accepting a cookie from websites you visit. If you do not accept cookies, however, you may not be able to use all aspects of our Services. Riipen and our third party partners also collect information using web beacons (also known as “tracking pixels”).

You will not be able to opt-out of any cookies or other technologies that are “strictly necessary” for the Services.

Updates to this Notice

This Cookies & Tracking Notice may be updated from time to time.  If we make any changes, we will notify you by revising the “effective starting” date at the top of this notice.



210 - 128 West Hastings St.,
Vancouver BC, V6B 1G8