Security

Last updated: 21 Aug 2025

1. Approach

We follow a defense-in-depth approach combining secure development practices, infrastructure hardening, and continuous monitoring to protect your data.

2. Application security

  • Least-privilege access and role-based authorization.
  • Input validation and output encoding.
  • Audit logging for sensitive admin actions.

3. Data security

  • Encryption in transit (TLS) and at rest (provider-managed where applicable).
  • Access controls and periodic reviews of data access.
  • Backups and tested restore procedures for critical data stores.

4. Operations

  • Vulnerability management and timely patching of dependencies.
  • Monitoring and alerting on key security and availability indicators.
  • Incident response procedures including containment, remediation, and post-incident review.

5. Contact

For security inquiries or to report a vulnerability, contact: Atrox Media, Parkowe Wzgorze 126, 32-031 Mogilany, Poland.