Defense in depth
Multi-layer controls across network, identity, application, and data planes. No single bypass takes down the security posture; every breach assumption is modeled and mitigated.
Trust · Security
Defense-in-depth architecture, least-privilege identity, encryption everywhere, continuous testing, and a documented incident-response plan. Audit pack available under NDA.
Six pillars
These are the principles. The detailed controls below are how we live them on each engagement.
Multi-layer controls across network, identity, application, and data planes. No single bypass takes down the security posture; every breach assumption is modeled and mitigated.
Role-based access enforced at the IdP, scoped IAM policies for engineers, time-bounded elevated access via change tickets, and quarterly access reviews per workload.
TLS 1.2+ in transit, AES-256 at rest, customer-managed keys (CMK) for ePHI and PCI workloads, envelope encryption for application secrets, KMS rotation on documented schedules.
Annual third-party penetration testing, quarterly internal red-team exercises, daily SCA / SAST / DAST in CI, dependency vulnerability scanning with auto-remediation PRs.
Documented IR plan rehearsed quarterly. Named on-call, escalation tiers, customer-notification SLA published. Post-incident reviews shared with affected customers under NDA.
All subprocessors flow through CITADEL vendor-risk review. BAA / DPA / SCC executed before data flows. Subprocessor list maintained publicly and updated quarterly.
Controls in detail
Network, identity, application, and data. The control set applies to every engagement; the depth scales to the regulatory frame the workload sits in.
Network
Identity
Application
Data
Incident response
IR plan rehearsed quarterly. Named on-call, customer-notification SLA published, post-incident reviews shared under NDA.
Continuous monitoring across infra, identity, application, and data planes. Alerts route to a 24×7 on-call rotation with documented runbooks per signal class. Mean time to acknowledge: < 15 minutes for P0/P1.
On-call engineer assesses scope and triggers containment within the first hour for confirmed incidents. Containment may include credential rotation, network isolation, or rolling back a deploy. Customer impact assessment in parallel.
Affected customers notified within 72 hours of confirmed material impact, often sooner per contract. Notifications include scope of impact, affected data classes, remediation status, and a named point of contact for follow-up.
Root cause identified, mitigations deployed, monitoring tuned to prevent recurrence. Production restored under documented health checks. Customer-facing services validated end-to-end before resuming normal operations.
Blameless post-mortem within two weeks. Affected customers receive the review summary under NDA, with our remediation timeline and any compensating controls. Quarterly review of all incidents at the leadership level.
Security review
SOC 2 Type II report (under NDA), pen-test summary, subprocessor list, security questionnaire response, BAA / DPA templates. Most requests filled the same business day.