Integrations
Trust center
Our company
Rewst develops and delivers SaaS products that provide our customers with a Robotic Process Automation platform for automating workflows. In addition to providing world-class software solutions for our customers, we are committed to ensuring industry best practices are in place to secure our platform.
Compliance
SOC2 report and security packet
Access our SOC2 Report and Information Security Packet. After signing an NDA, you will be able to access our SOC 2 Report and additional information security program resources.
Documents
In addition, the following documentation is publicly available:
Security and compliance program overview
This page was last updated: 9/26/2025
Data and access
- Data encrypted at-rest and in-transit
- Role-based access control (RBAC)
- Principle of least privilege
Application security
- Continuous vulnerability scanning
- Logging and monitoring solution
- Pentesting, including OWASP
- Role-Based Access Control (RBAC)
- OAuth 2.0 Authentication
- Simulated Threat Tabletop Exercises
Development
- CI/CD pipeline security w/ automated security testing
- Dependency scanning & vulnerability management
- Integrated DevSecOps practices
- QA Code Review Team
- Static application security testing (SAST)
- Dynamic application security testing (DAST)
- Vulnerability Disclosure Program (VDP)
Workforce security
- Employee Device Encryption
- Secure Password Management
- Multi-Factor Authentication (MFA)
- Continuous Security Awareness Training
- Simulated Phishing Testing