top of page

Security Overview

Encryption: TLS in transit; encryption at rest for databases and backups.

Access: least privilege access; MFA for admin; audited actions.

Development: secure SDLC, code review, dependency scanning, vulnerability patching.

Monitoring: centralised logging, alerts, incident response runbook.

Availability: regular backups; disaster recovery drills.

Vendors: due diligence for all sub-processors (see sub processors).

Last updated: 2025-08-25

bottom of page