Security
Last updated: 21 Aug 2025
1. Approach
We follow a defense-in-depth approach combining secure development practices, infrastructure hardening, and continuous monitoring to protect your data.
2. Application security
- Least-privilege access and role-based authorization.
- Input validation and output encoding.
- Audit logging for sensitive admin actions.
3. Data security
- Encryption in transit (TLS) and at rest (provider-managed where applicable).
- Access controls and periodic reviews of data access.
- Backups and tested restore procedures for critical data stores.
4. Operations
- Vulnerability management and timely patching of dependencies.
- Monitoring and alerting on key security and availability indicators.
- Incident response procedures including containment, remediation, and post-incident review.
5. Contact
For security inquiries or to report a vulnerability, contact: Atrox Media, Parkowe Wzgorze 126, 32-031 Mogilany, Poland.