Security at Opactor

Your security is our top priority. We implement industry-leading security measures to protect your data and ensure the reliability of our platform.

Data Encryption

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3, ensuring your information remains secure at all times.

Access Control

Multi-factor authentication (MFA), single sign-on (SSO), and role-based access control (RBAC) keep your accounts secure.

Compliance

We maintain SOC 2 Type II certification and comply with GDPR, CCPA, and other data protection regulations worldwide.

Security Team

Our dedicated security team continuously monitors for threats and implements best practices to maintain platform security.

Incident Response

24/7 monitoring with rapid incident response procedures ensure any security events are quickly identified and resolved.

Regular Audits

Third-party security audits and penetration testing help us identify and address potential vulnerabilities proactively.

Infrastructure Security

Cloud Infrastructure

Our infrastructure is hosted on AWS with multiple availability zones, ensuring high availability and disaster recovery capabilities. We leverage AWS security best practices including VPC isolation, security groups, and network ACLs.

Data Backups

Automated daily backups with point-in-time recovery ensure your data is never lost. Backups are encrypted and stored in geographically distributed locations for additional redundancy.

DDoS Protection

Advanced DDoS protection and Web Application Firewall (WAF) protect against common attacks and ensure platform availability even during attack attempts.

Security Best Practices

For Your Account

  • Enable two-factor authentication (2FA) on your account
  • Use strong, unique passwords for your account
  • Regularly review account activity and API access
  • Keep your contact information up to date

For Your Applications

  • Rotate API keys and credentials regularly
  • Implement proper authentication in your integrations
  • Use webhook signatures to verify requests
  • Follow the principle of least privilege for access

Reporting Security Issues

If you discover a security vulnerability, please report it to our security team immediately. We appreciate your help in keeping Opactor secure.

For qualifying reports, we offer rewards through our bug bounty program.