Security
Security controls designed to protect uploads, account data, and analysis results.
Encryption
- All traffic is protected using TLS in transit.
- Stored files and logs are encrypted at rest.
- Encryption keys are rotated on a scheduled basis.
Access Controls
- Role-based access policies limit internal data access.
- Administrative actions are audited and monitored.
- Multi-factor authentication is enforced for privileged users.
Infrastructure Security
- Continuous vulnerability scanning of systems and dependencies.
- Network segmentation and managed perimeter controls.
- Automated backup and recovery routines.
Incident Response
- 24/7 monitoring for service and security anomalies.
- Documented response runbooks with severity escalation.
- Affected customers are notified after confirmed incidents.
Vulnerability Disclosure
Report suspected vulnerabilities to security@forensiclens.ai. We acknowledge reports promptly and coordinate remediation updates.
Compliance
We maintain controls aligned with SOC 2 readiness practices and privacy laws applicable to our customers.