top of page
Secure by design.
Interaction
Chariot’s technology is built to just interact with the fields or details required to complete a task. For example, our DAFpay technology interacts with fields in a portal that are necessary to submit a grant request.
Access
Chariot follows the principle of least privilege, meaning that access to Chariot systems is by default restricted and only granted on an as-needed, per request basis. This is true for both our clients and internal team.
Users accessing Chariot’s Dashboard must have Multi-Factor Authentication (MFA) enabled to login. Chariot’s staff is also required to have MFA enabled for all internal tools and systems.

Built with the best.
Modern Technology
Chariot is hosted on AWS cloud infrastructure in the United States, leveraging years of safety enhancements to ensure maximum performance, resilience, and speed of deployment.
Encryption
Information that Chariot’s technology passes through, but does not store, (e.g. login credentials in DAFpay) is fully encrypted in both directions.
We use a combination of the Transport Layer Security (TLS) and Advanced Encryption Standard (AES-256) to keep your personal information safe.
Monitoring
Chariot's infrastructure is continuously monitored using industry-leading intrusion detection systems that provide alerts for control breaches or when infrastructure needs attention.
Our 24/7 on-call team ensures all alerts are promptly acted on.
Expert Advisory
Oneleet, a leading cyber security advisory firm, performs system monitoring and hosts our public trust center for maximum transparency.
External review.
Third-Party Audits & Testing
SOC 2, Type 2 Compliant
Third-Party Penetration Tests
Documentation available upon request
InfoSec Diligence By Customers
Chariot has gone through rigorous vendor review processes by dozens of major hospital systems, universities and large multinational organizations.
Bank Partner Program
Chariot is a financial technology company, not a bank. We are a program of Column N.A. member FDIC, who ensures that we adhere to strict security standards, with ongoing monitoring and review.
bottom of page