Our Commitment

Security is fundamental to everything we build. As a company that provides authentication services and handles sensitive data, we take our responsibility to protect our customers seriously.

We follow industry best practices and continuously improve our security posture to stay ahead of emerging threats.

Infrastructure Security

Our infrastructure is built on industry-leading cloud platforms with robust security controls:

  • Cloud Infrastructure — Hosted on AWS with SOC 2 and ISO 27001 certified data centers
  • Encryption in Transit — All data transmitted using TLS 1.2+ encryption
  • Encryption at Rest — Sensitive data encrypted using AES-256
  • Network Security — Firewalls, intrusion detection, and DDoS protection
  • Access Control — Role-based access with multi-factor authentication for all systems

Application Security

  • Secure Development — Security review integrated into our development process
  • Vulnerability Scanning — Regular automated and manual security assessments
  • Dependency Management — Continuous monitoring for vulnerabilities in dependencies
  • Input Validation — Strict validation and sanitization of all user inputs

Data Protection

  • Data Minimization — We only collect data necessary for service operation
  • Access Logging — Comprehensive logging of data access and system activities
  • Backup & Recovery — Regular backups with tested recovery procedures
  • Data Retention — Clear policies on data retention and deletion

Compliance

We maintain awareness of and alignment with relevant privacy regulations:

  • CCPA — California Consumer Privacy Act compliance for California residents
  • GDPR — Data protection measures aligned with EU requirements

Security Questions?

For security inquiries or to report a vulnerability, please contact us.

Contact Us