Application: We conduct third-party penetration tests and employ a dedicated security advisor. Our penetration testers evaluate the source code, running application, and the deployed environment. We also use battle-hardened development frameworks and tools such as Github, ReactJS, Postgres, and Python. Opto maintains our software packages and libraries versions in order to address the latest reported security vulnerabilities. We also utilize high-quality static analysis tooling like Dependabot to secure our product at every step of the development process.
Infrastructure: Opto uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including SecurityHub, as well as other industry leading tools like Vanta. In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.
How do you monitor for security vulnerabilities?

Written by Zo Chatoor
Updated over a year ago