Skip to main content
For You
For Parents
For Business

Were you a victim of the latest breach? Save up to 60% and get protection now!

Help Keep Your Kids Safe With New

Online Safety and Balance Tools

Get Help
Pricing
Solutions
Down icon
Online Safety
Credit Monitoring
Identity Theft Protection
Identity Theft Insurance
Online Data Removal
VPN & Online Privacy
Antivirus
Password Manager & Vault
Spam Call Protection
Child Online Safety
Parental Controls & Safe Gaming
Messaging Insights
Wellbeing Trend Reports
AI Chat App Alerts
Which protections are most important to you?
Find Your Perfect Plan

Take our simple quiz to discover the best plan for your needs.

Take Quiz
Just browsing? Here’s a great place to start.
Resources
Down icon
Customer Service
FAQ
Help
Resolution Resources
Digital Security 101
Aura Reviews
Leaked passwords and personal data alerts.
Is Your Data Protected?

Use our free tool to see if your information has been leaked—and learn what to do about it.

Run Free Scan
How Aura Works
About
Down icon
About Aura
Leadership
Areas of Expertise
Corporate Responsibility
Data Security & Privacy
Digital Parenthood
Newsroom
Innovation
Aura Intelligence
Clinical Research
Careers
Life at Aura
Join Us
Father and son looking at tablet.
Raising a Connected Generation

Aura’s Digital Parenthood Initiative is sparking a national conversation on healthy use of technology, giving parents the tools needed to support their kids.

Explore the Community
Sign In
Get Help
Overview
Work With Us
Down icon
Managed Service Providers
Partners and Resellers
Affiliates
Influencers
Play button
It’s Time to Get Smarter About Online Safety

Smart, simple online safety. Powered by AI. Everything you need in one easy-to-use app.

Watch the Video
Resources
Contact Us
For You
For Parents
For Business
Sign In
Start Free Trial

Security Standards

Last Updated: 

Nov 7, 2025

Website Terms of Use

The below is a general description of Aura’s security standards and practices as of the date hereof. Aura is continuously reviewing its practices and the following may change without notice as Aura deems reasonably necessary to improve its security standards and practices.

Secure Architecture

  • All personal data of customers of Aura’s products or services (“Customer Data”) is restricted to authorized Aura team members based on the principle of least privilege and a need-to-know basis. 
  • Customer Data is stored within the production environment and is processed as needed to provide Aura products and services to the customer or otherwise in accordance with Aura’s privacy policy. 
  • Web access, where end-users access their Customer Data, is segregated from the rest of Aura’s technical architecture. 
  • Direct administrative access to Aura’s architecture from the public Internet is prohibited.

Information Security Policy and Program Management

Aura Security Program is overseen by Aura’s Executive Management. The execution of the Security Program is delegated to the Chief Information Security Officer (CISO). Management delegates the maintenance of issue-specific policies to the CISO. Policies are reviewed annually and govern essential functions such as access control, data handling, incident response, vulnerability management, and secure development.

Vulnerability Management

We employ a multi-layered vulnerability management program that includes periodic internal and external vulnerability scans, ongoing static and third-party code analysis, and regular penetration tests of our products and services.

Findings from security tests are prioritized based on risk. We maintain a formal process to track and remediate identified vulnerabilities, with a focus on addressing critical and high-risk findings in alignment with our defined remediation SLAs. Remediated systems are subject to re-testing to validate the effectiveness of applied fixes.

Asset Management

  • Aura maintains a process for identifying and inventorying company assets (hardware and software).
  • Asset lifecycles are controlled and managed. The IT department is responsible for managing the lifecycle and secure destruction of decommissioned physical assets.

Data Classification

Protecting data starts with an understanding of the types and locations of data within an organization. Aura classifies all data into three categories:

  • Public data: Any data elements that have been approved by Legal for public consumption. These include public web pages, press releases, job postings, public financial reporting etc. This information may be shared as needed.
  • Internal-Use-Only: Any data that does not fall into the Public or Sensitive category. Access to this data is limited by business need.
  • Sensitive data: This includes Customer Data. This data is stored in secured locations and encrypted in accordance with strong, industry-recognized standards. Access is limited by roles and business need.

Data Handling

  • Sensitive Data is stored in the Production Environment, and in authorized, secure storage locations.
  • Sensitive Data does not move out of the Production environment unless required to provide Aura products or services, or as otherwise set forth in Aura’s privacy policy. 
  • Destruction of electronic data is carried out using approved methods for secure destruction

Encryption

We require Sensitive Data to be transmitted in an encrypted format when traveling beyond Aura networks. Aura employs strong encryption protocols to protect data. Data in transit is protected using TLS ver. 1.2 or higher for Web Sites and data exchange with Vendors and Partners. Data at rest, including in databases and file systems, is encrypted using robust, industry-recognized algorithms. We also enforce encryption on endpoint devices and utilize secure vaults for key management.

Internal Aura Account Management

  • The assignment of account privileges throughout the organization are guided by the “Least Privilege Principle”, “Need to know” and the use of Role Based Access. Least privilege principle holds that each user will be assigned the minimum account privileges necessary to perform their job functions.
  • Requests for new, modified, or ad hoc access to Customer Data are subject to review and approval by the designated system or data owners based on a demonstrated business need. 
  • Roles are established at the time of hire by People Operations and are auto-provisioned by the HRIS system and identity provider (IdP) system.
  • Account privileges for separated employees or contractors are revoked in a timely manner upon separation.
  • To maintain individual accountability, user accounts are required to be uniquely identifiable and traceable to a specific person.
  • The use of shared, or generic, accounts is strongly discouraged. In the rare situation in which a shared account is needed, each use of the account must be tied to the person using it via audit record.
  • We enforce strong password complexity and history requirements, enforced by our identity provider, in line with modern industry guidance. 

Security Awareness

  • Information Security and Privacy training is mandatory for employees at time of hire. Additionally, regular re-training occurs.
  • All employees and contractors are provided an internal website that encapsulates the security policies for the organization.

Malware Detection

  • Company workstations are protected by industry-standard malware prevention and detection software. Configurations are set to prevent users from disabling the software.
  • In addition, malware detection is being done by web and email gateways.

Physical Security

  • Aura's production systems and customer data are hosted by a Cloud Service Provider (CSP). Aura does not operate on-premise data centers. The CSP is responsible for the physical and environmental security of its data centers and is audited regularly.
  • Aura makes use of a single office space, where employees can meet and interact with others. This space is designated for employee collaboration and is not authorized for the storage or processing of production data.
  • There are no trusted networks in the collaboration space.  All network access to company data must be authenticated and authorized through a SASE gateway.
  • Visitors are permitted at the collaboration space with registration. Secure areas are protected by appropriate entry controls to restrict access to authorized personnel.

Application Security

  • Aura uses an Agile development methodology and deployments are handled in a continuous delivery model.
  • Aura maintains a Software Development Life Cycle (SDLC) with consideration and training for common vulnerability patterns, such as those identified by industry groups like OWASP.
  • Development and testing is carried out in a separate environment using a test data set. The use of production data in development or testing is prohibited.
  • Static Code analysis is carried out as part of the development pipeline.

Change Management

  • The company uses an agile methodology for engineering and a continuous delivery model of changes to production.
  • Changes follow a defined change management process, which includes requirements for approval and separation of duties before release. 

Network Controls

  • The Aura network is designed with a defense in depth philosophy. Our product is built on a modern, secure, and scalable cloud foundation that leverages isolated components to ensure process integrity and secure data flow. Network segments are separated by network firewalls or application firewalls.
  • The edges are protected by web application firewalls. Direct network-layer connectivity to our edge boundaries is restricted.
  • Data Loss Prevention systems are employed on endpoints and network layers
  • Changes to firewall rules (often in the form of security groups or web application firewalls) are logged and reviewed.
  • All endpoint connections to the Internet go through a web gateway which provides blocklists, data loss prevention, and security hygiene services.
  • Wireless access is provided in the collaboration space, but is not considered a trusted network and is segregated from the production environment.

Remote Access

  • Remote access to internal company resources requires authentication through a secure gateway, which enforces Multi-Factor Authentication and logging.

Security Monitoring

  • Security-relevant logs are centralized and managed by the Information Security team, with appropriate monitoring and response procedures.

Security Incident Handling

  • Security incidents are managed by the Information Security and Engineering teams as appropriate.
  • Incidents are classified according to the Incident Response Plan
  • Incident Response Plan is defined and reviewed annually. The plan includes considerations for notification, response, and the use of third party resources.  
  • Tabletop exercises are conducted at least annually.

Compliance

Aura Suite certifies to the following security standards:

  • PCI DSS
  • SSAE 18 SOC2 Type II
  • ISO27001
Help
Contact
Digital Security 101
About
About Aura
Aura Reviews
Careers
For Business
833.552.2123

© Aura 2022. 

 All rights reserved.

LegalPrivacy Policy
Your Privacy Choices
Privacy Choices icon, links to the Privacy Choices page
Sitemap
Turn offon Reduced Motion
Turning this switch on will reduce motion on the site.

*The Identity Theft Insurance is underwritten and administered by American Bankers Insurance Company of Florida, an Assurant company. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions. The Personal Cyber Insurance is underwritten and administered by Houston Casualty Company, a Tokio Marine company. Please refer to the actual policy for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions. Review the Summary of Benefits.

** Free trial offer can only be redeemed once per customer. Full access to plan features depends on identity verification and credit eligibility.

¹ The score you receive with Aura is provided for educational purposes to help you understand your credit. It is calculated using the information contained in your Equifax credit file. Lenders use many different credit scoring systems, and the score you receive with Aura is not the same score used by lenders to evaluate your credit.

² 60-day money back guarantee is only available for our annual plans purchased through our websites (excludes Amazon) or via our Customer Support team. You may cancel your membership online and request a refund within 60 days of your initial purchase date of an eligible Aura membership purchase by calling us at 1-833-552-2123.

If you signed up for Aura through a free trial, then your membership purchase date will be the date you signed up for your free trial, and you will have 60 days from the date you signed up for your free trial to cancel and request a refund. If you switched to a new annual plan within 60 days of your initial Aura annual subscription, you may still qualify for the Money Back Guarantee (based upon your initial annual plan purchase date).

³ As compared to the competition. Results based on a 2025 mystery shopper consumer study conducted by ath Power Consulting. ath Power Consulting was compensated by Aura to conduct this study.

⁴ Child members on the family plan will only have access to online account monitoring and social security number monitoring features. All adult members get all the listed benefits.

⁵ Ranked #1 by Forbes, CNBC, and CNET. They may be compensated as a marketing affiliate of Aura, but their ratings are all their own.

⁶ cdc.gov.../getmoving

⁷ commonsensemedia.org.../new-normal

⁸ kaspersky.com.../parents-worried

⁹ Javelin 2022 Identity Fraud Study

‡ Not all features use AI capabilities.

No one can prevent all identity theft or monitor all transactions effectively. Further, any testimonials on this website reflect experiences that are personal to those particular users, and may not necessarily be representative of all users of our products and/or services. We do not claim, and you should not assume, that all users will have the same experiences. Your individual results may vary.

AURA SERVICES ARE NOT INTENDED TO DIAGNOSE, TREAT, CURE, OR PREVENT ANY DISEASE OR MEDICAL CONDITION. THE SERVICES ARE FOR INFORMATIONAL PURPOSES ONLY AND CANNOT REPLACE THE SERVICES OF PHYSICIANS OR MEDICAL PROFESSIONALS.

Aura's service does not monitor for all content or your child’s behavior in real time. Alerts and/or insights may not be 100% accurate or timely.

Aura does not sell your personal data for monetary consideration. Some of our uses of cookies and/or pixels, however, may be considered a “sale” under applicable state laws.