Skip to main content
Use this checklist to harden your HoopAI account and protect your business data. Work through each item from top to bottom — the list is ordered from highest to lowest impact.

The checklist

1. Enable two-factor authentication for all users

Two-factor authentication (2FA) is the single most effective step you can take. Require every user on your account to enable it.
  • Go to Settings > Security > Two-Factor Authentication
  • Toggle Require 2FA for all users
  • Users who haven’t set up 2FA will be prompted on their next login
For a step-by-step setup guide, see Two-factor authentication.

2. Use strong, unique passwords

Every HoopAI user should follow these rules:
RuleWhy it matters
Minimum 12 charactersShort passwords are easily brute-forced
Mix of uppercase, lowercase, numbers, symbolsIncreases entropy
Never reuse passwords across servicesA breach on another site won’t compromise HoopAI
Use a password managerRemoves the need to memorize complex passwords
Admins can enforce a minimum password length and complexity policy in Settings > Security > Password Policy.

3. Review user permissions regularly

Over time, users accumulate permissions they no longer need.
  • Go to Settings > My Staff and review each user’s role
  • Apply the principle of least privilege — give users only the access they need
  • Downgrade roles for users who have changed responsibilities
  • Audit permissions at least once per quarter

4. Audit login history

Monitor who is accessing your account and from where.
  • Go to Settings > Audit Logs to review login events
  • Look for logins from unexpected IP addresses or locations
  • Investigate any failed login attempts that might indicate a brute-force attack
For full details on the audit log, see Audit logs.

5. Remove inactive users

Dormant accounts are a security risk — they can be compromised without anyone noticing.
  • Review users who haven’t logged in for 90+ days
  • Deactivate or delete accounts that are no longer needed
  • Document a process for offboarding departing team members promptly

6. Review API keys and revoke unused ones

API keys provide programmatic access to your entire account.
  • Go to Settings > API Keys
  • Review each key’s last-used date
  • Revoke any key that is no longer in active use
  • Never share API keys in emails, chat messages, or public repositories
  • Rotate keys periodically (every 90 days is a good baseline)
A leaked API key gives an attacker full access to your account data. Treat API keys like passwords.

7. Review connected integrations

Third-party integrations may have broad access to your data.
  • Go to Settings > Integrations
  • Review each connected app and its permission scope
  • Disconnect integrations you no longer use
  • Verify that each integration is from a trusted vendor

8. Enable SSO for enterprise accounts

If you are on an Enterprise plan, SSO centralizes authentication and lets you enforce your organization’s security policies.
  • Configure SAML-based SSO with your identity provider
  • Enforce SSO so users cannot bypass it with password login
  • See SSO and SAML configuration for setup instructions

9. Configure trusted IP ranges

If your team only works from known locations or VPNs, restrict access to those IPs.
  • Go to Settings > Security > IP Restrictions (Enterprise plan)
  • Add your office, VPN, or data center IP ranges
  • Users outside these ranges will be blocked from logging in
IP restrictions apply to browser and API access. Make sure to include IPs for any third-party services that call the HoopAI API.

10. Set session timeout

Reduce the risk of unattended sessions by configuring automatic logout.
  • Go to Settings > Security > Session Settings
  • Set the idle timeout (recommended: 30 minutes for sensitive accounts, 8 hours for general use)
  • Users will be logged out after the configured period of inactivity

11. Report a security incident

If you suspect unauthorized access or a data breach:
1
Contain the threat
2
  • Reset passwords for affected users immediately
  • Revoke any compromised API keys
  • Disable SSO temporarily if the IdP may be compromised
  • 3
    Document what happened
    4
  • Note the time you discovered the issue
  • Record affected users, data, and actions taken
  • Preserve screenshots and log exports
  • 5
    Contact HoopAI security
    6
  • Email security@hoopai.com with your account ID and incident details
  • The security team will respond within 4 hours for confirmed incidents
  • For urgent issues, use the in-app chat and request escalation to the security team
  • 7
    Review and remediate
    8
  • Work with HoopAI support to understand the scope
  • Implement additional controls to prevent recurrence
  • Notify affected parties if personal data was exposed
  • 12. Security certifications and compliance

    HoopAI maintains industry-standard security certifications and compliance frameworks.
    CertificationStatus
    SOC 2 Type IICertified
    GDPRCompliant
    CCPACompliant
    HIPAAAvailable on Enterprise (BAA required)
    Data encryption at restAES-256
    Data encryption in transitTLS 1.2+
    For full details on security practices, data processing, and compliance documentation, see Security and compliance.

    Quick-reference checklist

    Use this summary to track your progress:
    #ActionPriorityStatus
    1Enable 2FA for all usersCritical
    2Enforce strong passwordsCritical
    3Review user permissionsHigh
    4Audit login historyHigh
    5Remove inactive usersHigh
    6Review and rotate API keysHigh
    7Review connected integrationsMedium
    8Enable SSO (Enterprise)Medium
    9Configure trusted IP rangesMedium
    10Set session timeoutMedium
    11Know your incident response planMedium
    12Verify compliance needsLow

    FAQ

    Perform a full review quarterly. Items 1-2 (2FA and passwords) should be enforced continuously via policy settings. Items 3-6 deserve monthly attention if your team changes frequently.
    Yes. Go to Settings > Audit Logs, set your date range, and click Export CSV. Logs are retained for 12 months on Professional plans and 24 months on Enterprise.
    Hardware security key support depends on your plan and configuration. Check Settings > Security > Two-Factor Authentication to see available 2FA methods for your account.
    All data is encrypted at rest (AES-256) and in transit (TLS 1.2+). Database backups are also encrypted. File attachments in media storage are encrypted at rest on the storage layer.
    Contact your account manager or email compliance@hoopai.com to request a Business Associate Agreement. A BAA is available on Enterprise plans only.
    Last modified on March 6, 2026