Back to Home

Security Policy

Last updated: January 18, 2026

1. Infrastructure Security

  • Secure cloud infrastructure: Hosted on enterprise-grade cloud providers with SOC 2, ISO 27001 compliance
  • Network firewalls & isolation: Multi-layer firewall protection and network segmentation
  • Access logging & monitoring: Comprehensive logging of all system access and activities
  • DDoS protection: Protection against distributed denial-of-service attacks
  • Regular security updates: Automated patching and security updates

2. Data Protection

  • TLS encryption for data in transit: All data transmitted over TLS 1.2+ (HTTPS)
  • Encrypted databases: Data at rest encrypted using AES-256 encryption
  • Secrets management: API keys, passwords, and credentials stored in secure vaults
  • Backup encryption: All backups are encrypted and stored securely

3. Access Control

  • Least-privilege access: Users granted minimum necessary permissions
  • Multi-factor authentication (MFA): Required for all internal admin users
  • Regular access reviews: Quarterly reviews of user access and permissions
  • Session management: Automatic session timeout and secure session handling
  • Role-based access control (RBAC): Granular permissions based on user roles

4. Incident Response

  • Detection within 24 hours: Automated monitoring and alerting systems
  • Customer notification: If breach impacts customer data, notification within 72 hours as required by law
  • Root cause analysis: Comprehensive investigation of security incidents
  • Remediation: Immediate action to contain and fix security issues
  • Post-incident review: Lessons learned and process improvements

5. Security Audits & Compliance

  • Regular security audits: Annual third-party security assessments
  • Penetration testing: Regular penetration testing by certified security professionals
  • Vulnerability scanning: Continuous automated vulnerability scanning
  • Compliance standards: Working towards ISO 27001 certification (aspirational)

6. Security Best Practices for Users

To maintain security, we recommend users:

  • Use strong, unique passwords
  • Enable two-factor authentication (2FA) when available
  • Keep API keys and credentials secure
  • Regularly review account access and permissions
  • Report suspicious activity immediately

7. Security Contact

To report security vulnerabilities or incidents, contact us at:

Security Team: security@syntr.com
For urgent security issues: security@syntr.com (include "URGENT" in subject)

We appreciate responsible disclosure of security vulnerabilities. Please allow us reasonable time to address issues before public disclosure.