Skip to main content

Trust Center

Security

Security and privacy-by-design underpin every AutoKYC workflow. From zero-retention SDK defaults to immutable audit logs, we bake controls into the platform so your teams can evidence compliance quickly.

Latest penetration test

Completed 11 March 2024 by Cobalt.io

No critical findings; all medium findings remediated by 22 March 2024.

Certifications

ISO/IEC 27001:2022 • SOC 2 Type II (2024)

Reports and bridge letters available under NDA.

Platform architecture

AutoKYC runs as a multi-tenant SaaS platform with logical segregation between customers. Sensitive workloads (document storage, biometric processing, escalation queues) operate inside customer-specific projects with customer-managed encryption keys when required.

  • Regional deployments in EU (Frankfurt), UK (London), and US (Iowa) with data residency enforced per tenant.
  • Zero-trust network perimeter with service-to-service authentication via mTLS and short-lived SPIFFE identities.
  • Immutable audit ledgers capturing workflow changes, analyst votes, and escalation decisions for seven years.

Application security

Our secure development lifecycle includes mandatory code review, dependency scanning, and continuous fuzz testing for high-sensitivity APIs.

Static & dynamic analysis
Git-based SAST and container scanning on every PR, plus nightly DAST scans of authenticated console flows.
Secure SDLC
Threat modeling workshops, pair programming on critical paths, and mandatory security sign-off before release.

Data protection & privacy

We design for principle of least privilege and minimisation across all datasets, including applicant PII, beneficial ownership structures, and biometrics.

  • Encryption in transit (TLS 1.2 or higher) and at rest (AES-256) backed by hardware security modules.
  • Customer-defined retention policies with automated purge jobs and evidentiary holds for regulator requests.
  • Consent-aware SDKs that gate analytics and third-party scripts until end-users opt in.

For contractual commitments, see the Data Processing Addendum.

Access management

Internal access follows a strict separation-of-duties model with quarterly certification and real-time alerts on privilege escalations.

  • Okta with hardware-backed MFA for all staff, enforced device compliance, and phishing-resistant WebAuthn.
  • Break-glass procedures for incident response with dual approval and automated expiry after 12 hours.
  • Case data access logged per analyst, including reason codes and supervisor approvals for escalations.

Business continuity & resilience

AutoKYC performs quarterly disaster recovery exercises and tabletop simulations for regulator audits.

  • Point-in-time recovery for core data stores with 5-minute RPO and 30-minute RTO.
  • Webhook delivery queues replicated across regions with graceful failover and replay controls.
  • Managed services operate follow-the-sun coverage to preserve SLA commitments during localized disruptions.

Responsible disclosure

We welcome contributions from the security research community and commit to safe harbor for good-faith reports. Submit vulnerabilities to security@autokyc.com with details and reproduction steps.

  • We acknowledge receipt within one business day and provide status updates every five business days.
  • Rewards follow CVSS scoring and may include cash bounties or swag for high-impact submissions.
  • Out-of-scope: social engineering, denial-of-service, or attacks on third-party services.

Request security artifacts

Need penetration test summaries, SOC 2 reports, or our supplier register? Reach out to trust@autokyc.com from your company domain and include your mutual NDA if available.