At Greytip, security and privacy are foundational to every decision we make. We operate in a highly sensitive HR/Payroll domain, and we take this responsibility seriously. Our security program is built on globally recognized standards — including ISO 27001, SOC 2, GDPR, NIST, and Zero Trust principles — to ensure the confidentiality, integrity, and availability of your data.
Our security strategy is built on six core principles:
| Principle | To Be Sent To |
|---|---|
| Zero Trust | Verify every identity, device, and action |
| Defence in Depth | Multiple layers of controls and monitoring |
| Privacy by Design | Data minimization and GDPR-aligned handling |
| Shared Responsibility | Clear roles for us and our customers |
| Continuous Monitoring | 24/7 visibility of platform activity |
| Continuous Improvement | Regular testing, reviews, and training |
Governance foundations include:
We host our platform on secure, industry-leading cloud providers (AWS/GCP), benefitting from robust physical and environmental controls. Key infrastructure protections:
We enforce strict identity security, applying the Zero Trust model:
Protecting personal and payroll data is central to our security mission.
| Principle | Implementation |
|---|---|
| Encryption in transit | TLS 1.2+ |
| Encryption at rest | AES-256 |
| Key Management | Cloud KMS |
| Data Minimization | GDPR-aligned |
| Data Retention | Defined lifecycle + deletion workflows |
| Pseudonymization | Used in lower environments |
We comply with GDPR data rights, including access, correction, deletion, portability, and objection. We do not sell or share data for marketing purposes.
Our Secure SDLC ensures security is embedded throughout product development.
Our internal Security Operations Center (SOC) provides proactive threat detection.
Resilience is engineered into our platform.
| Component | Approach |
|---|---|
| Backups | Automated, encrypted, tested |
| DR Testing | Annual minimum |
| RTO/RPO | Enterprise-grade objectives |
| Redundancy | Cloud multi-AZ architecture |
Payroll availability is mission-critical — our DR strategy reflects that.
We align to and/or maintain:
Security is a partnership. We secure the platform and infrastructure — customers secure their access, configurations, and internal user practices.
1.Do you encrypt data?
Yes — AES-256 at rest, TLS 1.2+ in transit.
2.Do you perform pen tests?
Yes — annually by independent testers.
3.Do you support SSO & MFA?
Yes — both are supported and recommended.
4.Can we sign a DPA?
Yes — upon request.
5.Do you have incident response plans?
Yes — documented, tested, and SOC-monitored.
6.Do you store audit logs?
Yes — centrally stored, monitored, and retained.