Security Overview
Security Overview
We take security seriously and implement administrative, technical, and physical safeguards to protect your data.
1. Infrastructure & Encryption
- Hosting with reputable cloud providers and hardened configurations
- Encryption in transit (TLS) and at rest for sensitive data
- Network segmentation and firewalling
2. Access Controls
- Role-based access controls and least-privilege principles
- Multi-factor authentication for administrative access
- Audit logging of key actions
3. Development Practices
- Secure software development lifecycle and code review
- Dependency monitoring and timely patching
- Static/dynamic security testing where appropriate
4. Incident Response
We maintain an incident response process for detection, assessment, containment, and notification as required by law and contracts.
5. Responsible Disclosure
We welcome good-faith reports of vulnerabilities. Contact security to disclose a potential issue. Do not access or modify data without authorization.