Funnel Information Security Overview
At Funnel we take information security very seriously. Protecting your data is one of our most important responsibilities. We strongly believe in being transparent with how we work and this must also apply to our security practices so that you as a customer understand our approach and commitment.
Organizational security
Funnel has designed a security program that we work according to. The program is based on the global ISO 27001 standard and gives us an opportunity to work in a structured way to protect our organization and our customers' data. The program is led by our Chief Information Security Officer (CISO) which has the task of ensuring that we have appropriate security measures implemented and that these are continuously evaluated and improved.
Our approach to security compliance
In order to make our continuous security work verified, we have adopted several of the most accepted global security standards applicable to the SaaS industry (SOC 2 Type II and ISO 27001). As part of these standards, it is included that we annually conduct security audits with external independent auditors.
To support our customers in their internal compliance processes, customers are given the opportunity to get access to Funnel's security compliance profile* where we share audit reports and other associated compliance content.
With this transparent approach to our security compliance work, we would like to argue that our customers receive a strengthened assurance process that is more suitable and facilitates Security Due Diligence of SaaS products.
Due to this, we have also decided that we do not support the traditional approach of filling out vendor security questionnaires, simply because these questions can rarely be applied well in a SaaS context and the security domains that questionnaires are based on are covered in audit reports that customers can take part of.
- Existing customers who would like to get access to our security compliance profile can contact their sales representative
Policies
We do not externally share policy documentation. Please reference our SOC 2 Type 2 report for more detail surrounding the policies and procedures that we have in place.
.png?width=200&height=200&name=iso27001_badge.ac1ea71e%20(kopia).png)
ISO 27001:2022
Funnel's security program is certified according to the ISO 27001 standard, which means that we work structurally and long-term to protect our organization and our customers' data. Our Chief Information Security Officer (CISO) ensures that we have appropriate security measures in place and that these measures are continuously evaluated and improved.

SOC 2 Type II
Funnel has undergone a SOC 2 Type 2 attestation. SOC 2 is an attestation framework developed by the American organization AICPA that is perfectly suited for SaaS companies. The purpose of the framework is to be able to ensure that an organization has adequate security controls in place to protect its customers' data.

CSA STAR Level 1
We have evaluated our cloud service security capabilities using the Consensus Assessment Initiative Questionnaire (CAIQ) and submitted the result to the STAR Registry
Type of data that we process
In general, the type of data handled is related to cost monitoring. The majority of the data will be on costs, number of clicks, sign-ups and similar. The data originates from sources that our customers already use (Facebook, LinkedIn etc.) and will only be imported to Funnel from such sources that our customers actively choose to import.
In rare cases, there may be a use case in importing fields that could contain a customer ID number or something else that could be categorized as personal data. However, PII data is not the key type of data handled in the Funnel service; data for follow-up of costs is.
Is your product a system that your customers critically depends on (e.g., mission-critical)?
No
Are you hosted on one of the major cloud providers or do you have any on-premise systems?
Major cloud provider - AWS
The core of our security program is to prevent unauthorized access to our customers' data. All data is handled carefully according to a defined model and throughout the entire information life cycle using an associated set of security controls.
Information handling
All information assets are classified according to a developed classification matrix and have designated roles and ownership distributed across the organisation.
Data in transit
All data transferred between the customer's service and the various services within Funnel are done through the use of strong Transport Layer Security (TLS 1.2) encryption.
Data at rest
All data is encrypted at rest using the Advanced Encryption Standard (AES256).
Data segmentation
Our product operates in a Virtual Private Cloud and each customer's data are logically separated.
Risk management is a central activity within Funnel and it is of fundamental importance for our long-term stability to have a sound risk culture and effective risk management.
Risk life cycle
Funnel continuously identifies, assesses, manages and reports risks to which we may be exposed. Risk is assessed on the basis of its probability and impact according to an established model.
There are implemented access management controls to ensure that only authorised individuals can gain access. Users have been granted access rights that are sufficient for their role and for them to perform their duties (following the principles of Need-to-Know and Least Privilege).
Authentication
We use authentication controls such as Multi Factor Authentication, hardware tokens and Single Sign-On to secure the accounts used to manage our services.
Management of privileged access
The allocation and use of privileged rights is limited to authorized personnel only and all activities performed are closely monitored.
Access reviews
Review of accesses is performed according to an established process and is executed regularly.
Customer authentication options
We offer Single Sign-On and Multi Factor Authentication options for our customers through OKTA, Google and Azure AD.
Funnel's development organization follows a robust development process where security is an integral part of the various development phases.
Code deployment
All changes to source code destined for production use are subject to code review by a qualified engineering peer that includes security and performance analysis. Prior to updating production services, all contributors to the updated software version are required to commit that their changes are working as intended in the staging environment.
Use of 3rd party software
For the 3rd party software used as part of the development, there is an automated flow that ensures that potential vulnerabilities are identified and remediated.
All services are deployed redundantly in multiple physical data centers (availability zones). This setup protects the Funnel service from service disruptions in case of environmental risks such as seismic activity or flooding, power outage or connectivity issues.
Read more about data center controls at AWS here - https://aws.amazon.com/compliance/data-center/controls/
Backups of Funnel data is performed by AWS S3 versioning and lifecycle management. The backups are retained in multiple versions with a durability of 99.9999999999%. The versioning and restoration mechanisms are operated and tested by Amazon Web Services. Old versions can be accessed at an object-level on-demand without the need for a full restore of the complete data set. Funnel will backup all customer configuration and business data at least once every day. The data is stored as long as the customer is a customer of Funnel or if the customer chooses to delete the data.
For worst case scenarios and disaster recovery Funnel has an established Business Continuity Plan.
In the HR field, we work actively in a number of areas to ensure that our employees and consultants understand their responsibilities, are suitable for the roles and are continuously being trained.
Background checks
Background checks are conducted prior to employment with Funnel. Checks are made carefully and include credit history, criminal checks etc. Funnel uses external services in order to execute these activities.
Onboarding
Everyone follows an established onboarding process that includes signing an Acceptable use Policy, security introduction sessions etc.
Offboarding
Offboarding follows a strict process that includes predetermined steps that the nearest Manager needs to go through. It also includes communicating the ongoing liability that remains valid upon termination of employment with respect to the signed NDA or employment contract containing the confidentiality clauses.
Security awareness
There is an established awareness program that runs continuously throughout the year and which includes general training combined with more targeted training for current types of threats. In addition, Phishing simulation tests are conducted with general and targeted campaigns.
Disciplinary process
There is a disciplinary process that determines what actions will be taken when security has been breached and is intended to provide a fair, efficient and consistent method of handling disciplinary matters.
We see independent testing as important for continuous evaluation and we have established a formal process that includes various types of testing of our security posture. This is done through external partners who are accredited and certified in what they do.
Penetration testing
Funnel conducts a yearly penetration test using an independent external 3rd party specialised in cyber security. The penetration test is conducted as a Whitebox test where the penetration testers have access to system documentation and the source code while conducting the tests. This provides the penetration testers with optimal conditions to identify and verify the existence of potential vulnerabilities. An executive summary of the latest penetration test can be shared on request.
Internal penetration tests are scheduled once a year and conducted by the Security Team. Furthermore, continuous security reviews and tests are performed as an integrated part of the Secure Development method used in Funnel.
External audits
Funnel conducts annual external security audits performed by accredited Auditors.
Internal control
We have an internal control framework that includes a large number of defined controls. Controls are followed up and evaluated continuously.