Security at Krylos
Your trust is our priority. We implement industry-leading security practices to protect your data and ensure the privacy of your content.
Our Commitment to Security
At Krylos, security isn't an afterthought—it's fundamental to everything we build. We understand that you're trusting us with your website data, user information, and business-critical content. That trust drives us to implement and maintain the highest security standards in the industry.
Our security approach is comprehensive, covering infrastructure, application security, data protection, and operational practices. We continuously monitor, test, and improve our security posture to stay ahead of emerging threats.
Data Encryption
- Encryption in Transit: All data transmitted between your browser and our servers uses TLS 1.3 encryption
- Encryption at Rest: All stored data is encrypted using AES-256 encryption
- Key Management: Encryption keys are managed using AWS KMS with automatic rotation
Infrastructure Security
- AWS Infrastructure: Hosted on Amazon Web Services with SOC 2 Type II compliance
- Network Isolation: Services run in isolated VPCs with strict security groups
- DDoS Protection: AWS Shield and CloudFront provide protection against attacks
Access Control
- Role-Based Access: Granular permissions ensure users only access what they need
- Multi-Factor Authentication: Optional MFA for enhanced account security
- Session Management: Secure session tokens with automatic expiration
Data Privacy
- Data Isolation: Each organization's data is logically isolated in our database
- Minimal Data Collection: We only collect data necessary to provide our services
- Data Retention: Clear policies on how long we retain your data
Application Security
Secure Development
- • Code reviews for all changes
- • Automated security scanning in CI/CD pipeline
- • Dependency vulnerability monitoring
- • Regular security updates and patches
Protection Measures
- • SQL injection prevention through parameterized queries
- • XSS protection with content security policies
- • CSRF protection on all state-changing operations
- • Rate limiting to prevent abuse
Monitoring & Incident Response
24/7 Monitoring
Our systems are continuously monitored for security events, anomalies, and potential threats. Automated alerts notify our security team of any suspicious activity for immediate investigation.
Incident Response Plan
We maintain a comprehensive incident response plan that includes detection, containment, eradication, and recovery procedures. Our team is trained to respond quickly and effectively to security incidents.
Logging & Audit Trails
All system access and administrative actions are logged and retained for security auditing. These logs help us detect unauthorized access attempts and investigate security incidents.
Compliance & Standards
General Data Protection Regulation compliant
California Consumer Privacy Act compliant
Infrastructure hosted on SOC 2 Type II certified AWS
Note: We are committed to maintaining compliance with relevant data protection regulations and industry standards. Our practices are regularly reviewed and updated to meet evolving requirements.
Your Security Responsibilities
While we implement robust security measures, security is a shared responsibility. Here's how you can help protect your account:
Account Security
- • Use a strong, unique password
- • Enable multi-factor authentication
- • Never share your credentials
- • Log out from shared devices
Best Practices
- • Review team member access regularly
- • Revoke access for former team members
- • Keep your API keys secure
- • Report suspicious activity immediately
Report a Security Vulnerability
We take security vulnerabilities seriously and appreciate the security research community's efforts to help keep Krylos and our users safe. If you've discovered a security issue, please report it to us responsibly.
How to Report
Email us at security@krylos.io with:
- • A detailed description of the vulnerability
- • Steps to reproduce the issue
- • Potential impact assessment
- • Your contact information for follow-up
Our Commitment
We will acknowledge your report within 48 hours and provide regular updates on our progress. We ask that you give us reasonable time to address the issue before public disclosure.
Questions About Security?
If you have questions about our security practices or need more information, our team is here to help.