What we cover
- Security: Protection against unauthorized access
- Availability: System operational availability
- Processing Integrity: Complete and accurate processing
- Confidentiality: Protection of confidential information
- Privacy: Personal information handling practices
Key security controls
- Multi-factor authentication (MFA) required
- Role-based access control (RBAC)
- Encryption at rest (AES-256) and in transit (TLS 1.3)
- 24/7 security monitoring and audit logging
- Regular vulnerability assessments
- Disaster recovery and backup procedures
Get SOC II reports
SOC 2 reports are available to customers under NDA.Contact
- Privacy Team: security@keywordsai.co