Trust. Security. Transparency.

At ekai, we safeguard your data with industry-best practices, clear policies, and continuous improvement through our self-hosted architecture.

Security and Privacy

Our Trust Commitments

πŸ›‘οΈ

Security First

Protecting infrastructure, applications, and data with industry-leading practices

πŸ”’

Privacy & Compliance

Meeting global data protection regulations and maintaining customer data sovereignty

πŸ“‹

Transparency

Openly sharing policies, audits, and security controls with our customers

πŸ”„

Continuous Improvement

Ongoing monitoring, testing, and security enhancements

Security & Infrastructure

πŸ—οΈ

Infrastructure & Network Security

Self-hosted in customer cloud environments with comprehensive access controls, monitoring, and system hardening

  • Customer retains full control of infrastructure
  • Network segmentation and firewall protection
  • DDoS protection and monitoring
  • AWS WAF with customizable rules
  • Unique authentication and MFA for all production systems
  • Authorized access controls for databases, OS, and network components
  • Prompt access revocation upon personnel termination
  • Encrypted remote access with mandatory MFA
  • Intrusion detection and comprehensive log management
  • Infrastructure monitoring with real-time alerts
  • Network and system hardening standards maintained
  • Annual security reviews and hardening assessments
πŸ”

Application Security

Secure coding standards, continuous vulnerability scanning, and third-party security assessments

  • Continuous vulnerability scanning
  • Secure coding standards and code reviews
  • Third-party security assessments by Defang
  • Automated security testing in CI/CD pipeline
πŸ”‘

Encryption & Data Protection

TLS 1.2+ for data in transit, AES-256 encryption at rest with comprehensive data lifecycle management

  • TLS 1.2+ for all data transmission
  • AES-256 encryption at rest
  • AWS Key Management Service integration
  • Customer-controlled encryption keys
  • Data classification and access restriction to authorized personnel
  • Data retention and disposal procedures established
  • Customer data deletion upon service exit
  • Sensitive data handling protocols
  • Data sovereignty maintained in customer environment
πŸ‘€

Identity & Access Management

SSO integration with customer identity providers and MFA enforcement

  • Single Sign-On (SSO) integration
  • Google, Microsoft, and custom identity providers
  • Multi-Factor Authentication (MFA) support
  • Role-based access control (RBAC)
πŸ“Š

Incident Response & Monitoring

Formal incident response plan with customer-initiated incident management

  • Formal incident response procedures
  • Customer-initiated incident management
  • 24-hour SLA for enterprise support
  • Comprehensive logging and monitoring
πŸ”

Vulnerability & Penetration Testing

Continuous vulnerability scanning with independent security assessments

  • Continuous vulnerability scanning
  • Independent security assessments by Defang
  • Regular penetration testing
  • Automated security monitoring
πŸ‘₯

Organizational Security

Comprehensive personnel controls, asset management, and physical security measures

  • Background checks for all personnel with access to production systems
  • Security awareness training and annual performance evaluations
  • Code of conduct and confidentiality agreements
  • Production inventory maintained and regularly updated
  • Portable media encryption and mobile device management (MDM)
  • Visitor sign-in procedures and badge requirements
  • Escorted access to secure areas enforced
  • Physical security controls and monitoring
πŸ“‹

Internal Security Procedures

Business continuity, change management, governance, and incident response procedures

  • Business continuity and disaster recovery plans documented and tested
  • Cybersecurity insurance coverage maintained
  • Authorized, documented, and reviewed change management procedures
  • Production deployment restrictions and testing requirements
  • Defined security roles and maintained security policies
  • Board oversight and regular risk assessments conducted
  • Vendor management and third-party risk assessments
  • Formal incident management policies and procedures
  • Data backup procedures and system change communication
  • Support resources and service commitments communicated to customers

Compliance & Certifications

Since ekai is deployed in your environment, it leverages the compliance and security certifications already in place within your hosting infrastructure, including SOC 2, ISO 27001, HIPAA, PCI DSS, and GDPR where applicable.

We implement all necessary measures by default to help you maintain and support these compliance standards.

SOC 2 Type II
ISO 27001
GDPR
HIPAA
PCI DSS

What We Share

FAQ & Common Security Questions

Contact Security / Trust Team

Email

tech@yourekai.com

For security inquiries and incident reporting

Support

gtmadmin@yourekai.com

General support and technical questions