Security

Security You Can Verify

Defense in depth. Industry-standard cryptography. Transparent practices. Don't trust us—verify our claims.

AES-256-GCM
Encryption
TLS 1.3
Transport
SHA-256
Hashing
PBKDF2
Key Derivation

Security Architecture

Vulnerability Management

We take security research seriously. Here's how we handle vulnerabilities.

Responsible Disclosure

Found a security issue? We appreciate responsible disclosure. Email us at security@auditome.com and we'll respond within 24 hours.

Typical response: <24 hours

Dependency Scanning

Automated daily scans of all dependencies using Snyk and GitHub Security Advisories. Critical vulnerabilities patched within 24 hours.

Last scan: Today

Infrastructure Security

☁️

Cloud Provider

AWS (SOC 2, ISO 27001)

🌍

Data Residency

US-East, EU-West available

🔒

Network

VPC isolation, WAF protected

💾

Backups

Daily encrypted backups

🔄

Disaster Recovery

Multi-AZ, <1hr RTO

📊

Uptime

99.9% SLA guaranteed

Security questions?

We're happy to discuss our security practices in detail.