How Cybrove Secures Itself
As a security company, we hold ourselves to the highest standards. Here's how we protect your data.
We believe that a security company should lead by example. This page describes the security practices we follow to protect Cybrove and your data.
Infrastructure
Cybrove runs on Kubernetes with automated deployment pipelines. All infrastructure is provisioned as code and reviewed before deployment. We use separate environments for development, staging, and production with no shared credentials between them.
Encryption
In Transit
All connections use TLS 1.2 or higher. We enforce HSTS with preloading. Internal service-to-service communication is encrypted. Database connections use SSL.
At Rest
All data is encrypted at rest using AES-256. Database backups are encrypted. File storage uses server-side encryption. Encryption keys are managed through a dedicated key management service.
Authentication
Passwords are hashed with bcrypt (cost factor 12). We support MFA via TOTP for all accounts. Authentication tokens use httpOnly, Secure cookies with SameSite protection. Sessions can be revoked instantly through our admin panel. Refresh token rotation prevents token reuse.
Authorization
Role-based access control (RBAC) with granular permissions per role. Row-level security (RLS) at the PostgreSQL level ensures complete tenant isolation. Every API request is authenticated and authorized before processing. Admin actions require re-authentication.
Data Protection
Multi-tenant architecture with strict data isolation. Each organization's data is completely separate at the database level. Automated daily backups with tested restore procedures. Data retention policies enforced per plan. Data deletion available on request.
Code Security
TypeScript strict mode across the entire codebase. Input validation with Zod on every API endpoint. Dependency scanning in CI/CD pipelines. Code review required for all changes. No secrets in source code. Automated scanning prevents accidental commits.
Monitoring & Logging
24/7 uptime monitoring with alerting. Comprehensive audit logging of all security-relevant actions. Tamper-evident log chain using cryptographic hashing. Real-time alerting on suspicious activity patterns. Regular log review and analysis.
Incident Response
We maintain a documented incident response procedure covering: detection and classification, containment, investigation, remediation, communication, and post-incident review. We can revoke all sessions, rotate all credentials, and isolate affected systems within minutes.
Responsible Disclosure
If you discover a security vulnerability in Cybrove, please report it to security@cybrove.com. We appreciate responsible disclosure and will acknowledge your report within 24 hours. We commit to: confirming receipt within 24 hours, providing an initial assessment within 72 hours, keeping you updated on remediation progress, and crediting you in our security acknowledgments (if desired).
Bug Bounty
We welcome security researchers who help us improve Cybrove's security. If you find a valid security issue, we will work with you on appropriate recognition. Contact security@cybrove.com for details.
