Security

Security at SkyDrover

We take security seriously. Your data is protected by enterprise-grade security measures.

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Infrastructure

Hosted on SOC 2 Type II certified infrastructure with multiple availability zones.

Access Control

Role-based access control with multi-factor authentication available for all accounts.

Compliance

GDPR compliant with regular third-party security audits and penetration testing.

Data Protection

Automated backups, disaster recovery, and data retention policies.

Monitoring

24/7 security monitoring with automated threat detection and incident response.

Our Security Practices

Application Security

  • Regular security assessments and penetration testing
  • Secure development lifecycle with code reviews
  • Automated vulnerability scanning in CI/CD pipeline
  • Web Application Firewall (WAF) protection
  • DDoS protection and rate limiting

Data Security

  • AES-256 encryption for data at rest
  • TLS 1.3 for all data in transit
  • Database encryption with customer-specific keys
  • Secure key management using HSM
  • Regular backup encryption verification

Access Control

  • Multi-factor authentication (MFA)
  • Single Sign-On (SSO) with SAML 2.0
  • Role-based access control (RBAC)
  • Session management and timeout policies
  • Audit logging for all access

Compliance

  • GDPR compliant
  • SOC 2 Type II certified infrastructure
  • Annual third-party security audits
  • Data Processing Agreements available
  • Privacy Impact Assessments

Responsible Disclosure

If you discover a security vulnerability, please report it to [email protected]. We appreciate your help in keeping SkyDrover secure and will acknowledge your contribution.

Questions?

For security-related questions or to request our SOC 2 report, contact [email protected].