Trust · Security
Security posture.
Encryption, access control, infrastructure, and vulnerability management.
Encryption
- In transit
- TLS 1.2+ on all endpoints; HSTS enforced
- At rest
- AES-256 on databases and object storage
- Secrets
- KMS-backed; short-lived scoped credentials
Access control
- Employee access
- SSO + hardware key MFA required
- Customer RBAC
- Role-based access with least-privilege defaults
- Audit logs
- Append-only, immutable records
Infrastructure
- Regions
- EU + UK for production; pilot residency negotiable
- Isolation
- Per-tenant logical isolation; single-tenant option
- Backups
- Encrypted daily snapshots, 30-day retention
Vulnerability management
- SCA
- Automated on every PR
- Pen-test
- Third-party annual + pre-release
- Disclosure
- hello@xploreintelligence.co.uk (subject: Security disclosure); see /trust/responsible-disclosure