Last Updated: 25/12/2025
At Overpath, the security of your data is our highest priority. We have built our platform with a "Security-First" architecture, ensuring that protection is baked into every layer of our technology stack, from code to cloud.
Overpath is powered by Amazon Web Services (AWS), leveraging the same world-class security infrastructure used by the world’s leading financial institutions.
Data Residency: Our primary production environment is hosted in the AWS Ireland (eu-west-1) region to ensure high availability and compliance with EU data residency preferences.
Network Isolation: We utilize Virtual Private Clouds (VPC) with strict Security Group configurations to isolate our production environment from the public internet.
Inherited Compliance: By using AWS, we inherit a foundation that is certified for ISO 27001, SOC 2 Type II, and PCI DSS Level 1.
We ensure your data is protected both when it is sitting in our databases and while it is traveling to your screen.
Encryption at Rest: All customer data stored in our databases and storage volumes is encrypted using AES-256.
Encryption in Transit: All data sent between Overpath and our users is encrypted using TLS 1.2 or higher. We enforce HTTPS for all web traffic.
Key Management: We utilize AWS KMS (Key Management Service) for secure, hardware-backed encryption key management.
Secure Development: Our engineering team follows secure coding practices. We utilize automated dependency scanning to identify and remediate vulnerabilities before they reach production.
Access Control: We enforce the Principle of Least Privilege. Access to production systems is strictly limited to authorized engineering personnel and requires Multi-Factor Authentication (MFA).
Identity Management: We support modern authentication standards to ensure secure user access to the platform.
Taking into account the state of the art and the nature of the processing, Overpath shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including:
Encryption: Data at rest (AES-256) and data in transit (TLS 1.2+).
Access Control: Multi-Factor Authentication (MFA) and Least Privilege access models.
Resilience: Regular backups and disaster recovery protocols via AWS infrastructure.
Organizational Security
Employee Training: 100% of Overpath employees undergo mandatory security awareness training upon hire and annually thereafter.
Confidentiality: All staff and contractors sign comprehensive Non-Disclosure Agreements (NDAs) before gaining access to any internal systems.
Compliance Roadmap: Overpath is currently aligning its internal Information Security Management System (ISMS) with the ISO 27001 and SOC 2 frameworks as part of our 2026 compliance roadmap.
Privacy & GDPR
Overpath is fully committed to GDPR compliance. We act as a Data Processor for our clients and maintain a robust Data Processing Agreement (DPA) and a transparent Sub-processor List.
Definitions and legal reference
Overpath(or this Application)
The property that enables the provision of the Service.
© 2026 Overpath Ltd. All Rights Reserved.
