Security at ASOasis

Built for trust, secured for scale

Last updated: December 9, 2023

Security is core to our engineering culture. This page outlines the technical and organizational controls we employ to protect your data across our apps, APIs, and infrastructure.

Overview

We apply defense‑in‑depth across our stack: encryption in transit and at rest, strict access controls, continuous monitoring, and incident response. Learn more below.

Data Encryption

  • TLS 1.2+ for data in transit.
  • Encryption at rest for databases, object storage, and backups.
  • Key management with restricted access and periodic rotation.

Infrastructure & Network Security

  • Hardened cloud infrastructure with private networks and security groups.
  • WAF, DDoS protections, and rate limiting at the edge.
  • Least‑privilege IAM and audit logging across critical services.

Application Security

  • Secure SDLC, code reviews, and CI checks (linting, tests, SAST).
  • Dependency scanning and timely patching of vulnerabilities.
  • Secrets management and environment isolation.

Authentication & Access Controls

  • Strong password policies and optional multi‑factor authentication.
  • Role‑based access control and just‑in‑time elevation where applicable.
  • Session management with secure cookies and short‑lived tokens.

Data Retention & Backups

  • Backups with integrity checks and periodic restore testing.
  • Data retention aligned to product needs and legal requirements.
  • Secure deletion processes upon request or termination.

Monitoring & Incident Response

  • Centralized logging, metrics, and alerting across services.
  • Documented incident response runbooks and on‑call rotations.
  • Post‑incident reviews and remediation tracking.

Responsible Disclosure

We welcome reports from security researchers. If you believe you’ve found a vulnerability, please contact us with details atsecurity@asoasis.net. Do not publicly disclose without coordinated remediation.

Compliance

We align our practices with industry best practices and are working toward relevant compliance frameworks appropriate to our scale.

Subprocessors

We use reputable cloud providers and third‑party vendors to deliver the Services. Subprocessors are assessed for security posture and bound by DPA obligations.

Contact Security

Contact our security team at security@asoasis.net. For privacy questions, see our Privacy Policy.

Last reviewed: December 9, 2023
Back to top