Security Policy
Our Commitment
Vellunox is committed to protecting your data with industry-leading security practices. Security is not an afterthoughtโit's built into everything we do.
๐ Encryption
All data encrypted in transit (TLS 1.3) and at rest (AES-256). End-to-end encryption for sensitive communications.
๐ข Infrastructure
Enterprise-grade data centers (Azure) with 24/7 security monitoring, biometric access, and redundant systems. All SOC 2 Trust Service Criteria controls implemented and active.
๐ก๏ธ Network Security
DDoS protection, Web Application Firewall (WAF), intrusion detection, and real-time threat monitoring.
๐ Access Control
Multi-factor authentication, role-based access, principle of least privilege, and regular access reviews.
Data Protection
- Encryption at Rest: AES-256 encryption for all stored data
- Encryption in Transit: TLS 1.3 for all data transmission
- Key Management: Hardware security modules (HSMs) for key storage
- Data Isolation: Strict separation between customer environments
- Backup Encryption: All backups are encrypted
Security Practices
- Penetration Testing: Regular third-party security assessments
- Vulnerability Scanning: Continuous automated scanning
- Code Reviews: Security-focused code review process
- Security Training: Regular security training for all employees
- Bug Bounty: Responsible disclosure program
Incident Response
We maintain a comprehensive incident response plan:
- Detection: 24/7 monitoring and alerting
- Response: Immediate containment and investigation
- Recovery: Documented recovery procedures
- Notification: Customer notification within 72 hours for breaches
- Review: Post-incident analysis and improvements
Compliance
We maintain compliance with:
- SOC 2 Type II: Security, availability, and confidentiality
- GDPR: EU data protection regulation
- CCPA/CPRA: California privacy laws
- PCI-DSS: Payment card industry standards
- HIPAA: Healthcare data protection (where applicable)
Reporting Security Issues
We appreciate responsible disclosure. To report a security vulnerability:
Email: security@vellunox.com
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Your contact information
We commit to acknowledging reports within 24 hours and providing updates on remediation.