Security Practices
Last updated: 31 March, 2026
Security at Transcrypt
Security is the foundation of our business. We protect your data with enterprise-grade security features and rigorous compliance standards.
Infrastructure Security
Our infrastructure is hosted on top-tier cloud providers with SOC 2 Type II and ISO 27001 certifications. We utilize VPCs, firewalls, and rigorous access controls to ensure network integrity.
Data Encryption
All data is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption. We manage keys using a secure Key Management Service (KMS).
Access Control
We follow the principle of least privilege. Access to production systems is restricted to authorized personnel and requires multi-factor authentication (MFA). All access is logged and audited.
Effective Date: 31 March, 2026