Skip to main content
Bank-Grade Security
Bank-Grade Security Protecting your data at every layer

Multi-Layer
Encryption

Data protection is not a single lock on a single door. It is layers of encryption applied at every stage of data's lifecycle, from the moment it leaves your browser to long-term storage and eventual deletion.

Encryption Architecture

We implement encryption at three distinct layers, ensuring that even if one layer were compromised, your data remains protected by the others.

In-Transit Encryption

All communications between your device and our servers are encrypted using TLS 1.3, the latest and most secure transport layer protocol available.

  • TLS 1.3 with forward secrecy
  • HSTS (HTTP Strict Transport Security) enforced
  • Certificate pinning on mobile clients
  • Automatic redirect from HTTP to HTTPS
  • A+ rating on SSL Labs testing
At-Rest Encryption

All stored data is encrypted using 256-bit AES (Advanced Encryption Standard), the same standard used by the U.S. government for classified information.

  • AES-256 encryption for all stored data
  • Encrypted database volumes
  • Encrypted backups and snapshots
  • Encrypted file storage for documents
  • HSM-managed encryption key rotation
Application-Layer Encryption

Sensitive PII fields (Social Security numbers, bank account numbers, dates of birth) receive an additional layer of encryption at the application level with unique per-record keys.

  • Per-record encryption keys for PII
  • Keys stored in hardware security modules (HSMs)
  • Automatic key rotation on schedule
  • Encrypted even from database administrators
  • Decryption requires authenticated application context
Secure enterprise operations facility

Trust Is Earned

Every security measure exists because your data deserves it

Access Control & Authentication

Your data is accessible only by authorized personnel with a legitimate need. Every system enforces role-based access control, and every access event is logged, auditable, and monitored in real time.

Role-Based Access Control (RBAC)

Every user in the system is assigned a specific role with precisely defined permissions. Loan officers see only their pipeline. Processors see only their assigned files. No one has access beyond what their role requires.

  • Granular permission definitions per role
  • Least-privilege principle enforced
  • Role assignment reviewed quarterly
  • Automatic deprovisioning on role change
  • Separation of duties for sensitive operations
Multi-Factor Authentication (MFA)

Every internal user and every borrower account requires multi-factor authentication. Passwords alone are never sufficient to access any system in the Theos platform.

  • MFA required for all users, no exceptions
  • Support for TOTP authenticator apps
  • SMS and email verification as backup
  • Session timeout and re-authentication
  • Brute-force protection and account lockout
Audit Trail & Monitoring

Every data access, modification, and system action is logged with timestamp, user identity, IP address, and action details. These logs are immutable, tamper-evident, and retained according to regulatory requirements.

  • Complete audit trail on every data access
  • Immutable, tamper-evident log storage
  • Real-time anomaly detection
  • Automated alerting on suspicious activity
  • Retention per regulatory requirements

Certifications &
Compliance Standards

Operating in the mortgage industry means adhering to some of the most stringent regulatory requirements in financial services. We do not treat compliance as a checkbox exercise. It is woven into every system, every process, and every decision.

SOC 2 Type II

Independently audited annually by a qualified third-party firm, verifying that our security controls, availability safeguards, processing integrity, confidentiality measures, and privacy practices meet the rigorous Trust Services Criteria established by the AICPA.

CCPA / CPRA

Full compliance with the California Consumer Privacy Act and California Privacy Rights Act. Consumers have the right to know what data we collect, request deletion, opt out of sale, and limit the use of sensitive personal information.

GLBA

The Gramm-Leach-Bliley Act requires financial institutions to explain their information-sharing practices and safeguard sensitive data. Our privacy notices, data handling procedures, and security controls fully satisfy GLBA requirements.

ECOA

The Equal Credit Opportunity Act prohibits discrimination in lending. Our systems are designed to ensure fair treatment regardless of race, color, religion, national origin, sex, marital status, age, or receipt of public assistance.

TRID / RESPA

TILA-RESPA Integrated Disclosure rules govern how loan estimates and closing disclosures are prepared and delivered. Our systems automate compliant disclosure generation and delivery within required timelines.

State Licensing

Theos Financial maintains all required state and federal licenses. DRE License #02253229. NMLS ID #2685114. All loan officers individually licensed and subject to continuing education requirements.

Penetration Testing & Vulnerability Management

We do not wait for attackers to find vulnerabilities. We actively hunt for them through regular penetration testing, automated vulnerability scanning, and a structured remediation program.

External Penetration Testing

Third-party security firms conduct comprehensive penetration tests against our external-facing systems on a regular cadence.

  • Annual external penetration tests by qualified firms
  • Scope covers all client-facing applications
  • OWASP Top 10 vulnerability coverage
  • Findings documented with severity ratings
  • Critical findings remediated within 48 hours
Continuous Vulnerability Scanning

Automated scanners continuously assess our infrastructure and applications for known vulnerabilities.

  • Weekly automated infrastructure scans
  • Dependency and library vulnerability monitoring
  • Container image scanning before deployment
  • Automated patch management workflows
  • SLA-based remediation timelines by severity
Secure Development Practices

Security is built into our development process from the beginning, not bolted on at the end.

  • Security code review on every change
  • Static application security testing (SAST)
  • Dynamic application security testing (DAST)
  • Dependency vulnerability tracking
  • Security training for all developers

Incident Response & Business Continuity

Preparation is the most critical component of security. Our incident response plan is documented, tested, and rehearsed so that in the unlikely event of a security incident, our team knows exactly what to do.

Incident Response Plan
  • Documented response procedures for all incident types
  • Defined roles and escalation paths
  • Communication protocols for stakeholders
  • Evidence preservation procedures
  • Post-incident review and lessons learned
  • Annual tabletop exercises and simulations
Data Retention & Deletion
  • Data retained only as long as legally required
  • Automated retention policy enforcement
  • Secure deletion (cryptographic erasure) when retention expires
  • Consumer data deletion requests honored within 30 days
  • Backup data included in retention policies
  • Annual retention policy review
Business Continuity
  • Geographically distributed infrastructure
  • Automated failover and disaster recovery
  • Regular backup testing and restoration drills
  • Recovery time objective (RTO) under 4 hours
  • Recovery point objective (RPO) under 1 hour
  • Annual DR exercise with documented results

Ready to
Get Started?

Experience the security and speed of the Theos platform. Get a rate quote in under 60 seconds, knowing that every piece of data you share is protected by enterprise-grade security.

Get Your Rate in 60 Seconds Back to Technology