Skip to main content

Security

Welcome to vulnerabilities.io's Security Page. We are committed to providing a secure environment for our customers and protecting their sensitive data. We understand the importance of maintaining the highest standards of security. This page provides an overview of our security practices and measures to ensure the confidentiality, integrity, and availability of your data.

1. Data Encryption and Protection

We employ industry-standard encryption technologies to protect your data during transit and at rest. All data transmitted between your devices and our servers is encrypted using secure protocols. Additionally, your data is stored in encrypted form within our secure infrastructure.

We understand how important the data you're trusting us with is. We do not store your code following scans.

2. Infrastructure and Network Security

Our infrastructure is hosted on Microsoft Azure. As such, the physical and network security of our systems is enforced through robust, audited and evidenced technologies and practices.

Our PaaS systems are hardened against a best practice ways of working and we continually evolve our security posture.

3. Access Control and Authentication

Access to our systems and data is strictly controlled. We enforce strong access controls, including multi-factor authentication (MFA), to ensure that only authorised individuals can access our platform and customer data. Our employees are all experienced security professionals and receive comprehensive security training to maintain the confidentiality of your data.

4. Vulnerability Management & Security Testing

We follow a robust vulnerability management process, which includes regular security assessments, penetration testing and code reviews. Any identified vulnerabilities are promptly addressed through remediation efforts and we continuously monitor for emerging threats to ensure the ongoing security of our platform.

5. Data Privacy and Compliance

We are committed to protecting your privacy and complying with applicable data protection regulations. We adhere to strict data protection policies and procedures to safeguard your personal information. Our privacy policy outlines how we collect, use, and protect your data, and we handle your information in accordance with the General Data Protection Regulation (GDPR) and other relevant laws and regulations.

Vulnerabilities.io has an Information Security Management System (ISMS), Information Security Policy and Incident Response Plan to ensure robust operation principles are enforced.

6. Incident Response

In the event of a security incident, we have a well-defined incident response plan in place. Our team of security experts promptly investigates any incidents, takes immediate actions to mitigate the impact, and communicates transparently with affected customers. We strive to provide timely updates and support to address any security concerns.

7. Transparency and Continuous Improvement

We believe in transparency and continuous improvement. We regularly review and enhance our security practices, staying up-to-date with the latest security technologies and industry best practices. We welcome feedback and suggestions from our customers to further strengthen our security posture.

Security is at the core of everything we do. We strive to provide a secure and reliable platform, ensuring the highest level of protection for your sensitive data. If you have any questions or concerns regarding our security practices, please contact us at privacy@vulnerabilities.io.

Last updated: 16/03/2024