Security & Privacy
Your data security is our top priority. Learn how we protect your information and maintain compliance.
Enterprise-Grade Security
Enterprise-grade security practices. GDPR compliant, and encrypted at rest and in transit.
π Data Encryption
Encryption at Rest
- AES-256 encryption - All data stored in our databases is encrypted using industry-standard AES-256
- Encrypted backups - Database backups are encrypted before being stored
- Secure key management - Encryption keys stored in AWS KMS with automatic rotation
- Environment separation - Production data never touches development environments
Encryption in Transit
- TLS 1.3 - All API communication uses modern TLS 1.3 encryption
- HTTPS only - No unencrypted HTTP traffic allowed
- Certificate pinning - Mobile apps use certificate pinning to prevent MITM attacks
- VPN for internal services - All internal service communication over encrypted VPN
π Authentication & Access Control
User Authentication
- Multi-factor authentication (MFA) - Optional 2FA via SMS or authenticator app
- SSO support - Enterprise plans include SAML 2.0 single sign-on
- Password requirements - Minimum 12 characters with complexity requirements
- Session management - Automatic logout after 30 days of inactivity
API Authentication
- API keys with scopes - Generate keys with limited permissions
- OAuth 2.0 - Standard OAuth flows for third-party integrations
- Webhook signatures - HMAC-SHA256 signatures on all webhook payloads
- Rate limiting - Prevent abuse with intelligent rate limits
Webhook Signature Verification
const crypto = require('crypto');
function verifyWebhookSignature(payload, signature, secret) {
const hmac = crypto.createHmac('sha256', secret);
const expectedSignature = hmac.update(payload).digest('hex');
return crypto.timingSafeEqual(
Buffer.from(signature),
Buffer.from(expectedSignature)
);
} π‘οΈ Compliance Certifications
Enterprise Security
Enterprise-grade practices
Independent verification of our security controls, availability, and confidentiality measures.
GDPR Compliant
EU data protection
Full compliance with EU General Data Protection Regulation including data portability and right to deletion.
CCPA Compliant
California privacy law
Compliance with California Consumer Privacy Act including opt-out mechanisms and data disclosure.
HIPAA Ready
Healthcare data
Enterprise plans include Business Associate Agreement (BAA) for handling protected health information.
π Data Privacy
Data Minimization
- Only collect what's needed - We don't store data we don't use
- Automatic data expiry - Logs automatically deleted after 90 days
- Anonymization - PII removed from analytics and debugging data
- Data residency options - Choose where your data is stored (US, EU, Asia)
User Rights
- Right to access - Export all your data at any time via dashboard or API
- Right to deletion - Delete your account and all associated data permanently
- Right to portability - Download data in machine-readable JSON format
- Right to correction - Update incorrect information through your account settings
Data Export
You can export all your data from your account dashboard:
- Go to Settings β Privacy & Data
- Click "Export My Data"
- Receive download link via email within 24 hours
- Download includes all agents, executions, logs, and configurations
π’ Infrastructure Security
Cloud Hosting
- AWS infrastructure - Hosted on Amazon Web Services with 99.99% uptime SLA
- Multi-region redundancy - Data replicated across multiple availability zones
- DDoS protection - AWS Shield and CloudFlare for DDoS mitigation
- Automated backups - Daily encrypted backups with 30-day retention
Network Security
- Virtual Private Cloud (VPC) - Isolated network environment
- Web Application Firewall - AWS WAF protects against common exploits
- Intrusion detection - Real-time monitoring for suspicious activity
- IP allowlisting - Restrict API access to specific IPs (Enterprise)
ποΈ Monitoring & Auditing
Activity Logs
- User activity tracking - All login attempts, configuration changes logged
- API access logs - Complete audit trail of API requests
- Agent execution logs - Full history of what agents did and when
- Integration logs - Track data flowing to/from third-party services
Security Monitoring
- 24/7 security operations - Round-the-clock monitoring for threats
- Anomaly detection - Machine learning models detect unusual patterns
- Incident response team - Dedicated team for security incidents
- Vulnerability scanning - Weekly automated security scans
π€ Third-Party Integrations
Integration Security
- OAuth flows - Never store your third-party passwords
- Scoped permissions - Only request minimum necessary permissions
- Token encryption - Access tokens encrypted at rest
- Token refresh - Automatic token rotation for security
Vendor Security
- Vendor assessments - All integrations undergo security review
- Data Processing Agreements - DPAs with all sub-processors
- Regular audits - Quarterly review of third-party security posture
- Incident coordination - Direct communication channel with vendor security teams
Integration Permissions
You can revoke integration permissions at any time from your account settings. This immediately stops data flow.
π¨ Incident Response
Our Commitment
- Immediate notification - We'll notify you within 24 hours of any security incident
- Transparent communication - Regular updates throughout incident investigation
- Post-incident review - Detailed report with lessons learned and improvements
- Compensation policy - Service credits for SLA breaches due to security incidents
Report a Vulnerability
We take security seriously and welcome reports from security researchers. If you discover a vulnerability:
- Email security@inteliworks.io with details
- Include steps to reproduce the vulnerability
- Allow us 90 days to patch before public disclosure
- Receive recognition in our Hall of Fame (with permission)
Bug Bounty Program
We reward security researchers who responsibly disclose vulnerabilities:
- Critical: $5,000 - $10,000
- High: $2,000 - $5,000
- Medium: $500 - $2,000
- Low: $100 - $500
π Security Questionnaire
Need to complete a security questionnaire for procurement? We've got you covered:
Security Whitepaper
Comprehensive overview (PDF)
Security Whitepaper
Security documentation (PDF)
Custom Questionnaire
We'll complete yours
Have Security Questions?
Our security team is here to help with compliance requirements and security assessments.
Contact Security Team