Security & Trust
For a cybersecurity company, trust is non-negotiable. Here's how we protect your data and our infrastructure.
Data Protection
All scan data is encrypted in transit with TLS 1.3 and at rest with AES-256.
Default data retention is 30 days. Scan results and findings are automatically purged after the retention window. You can request immediate deletion at any time by contacting us.
We never share your data with third parties. Scan results are only accessible to authenticated users who initiated the scan.
Infrastructure Security
All traffic routes through Cloudflare, providing DDoS protection, web application firewall (WAF), and DNSSEC validation before reaching our infrastructure.
Our backend runs in isolated Docker containers with no published ports — all ingress flows through encrypted Cloudflare Tunnels. Database and cache services run on internal-only networks with no internet access.
Every container runs with cap_drop ALL (no Linux capabilities), no-new-privileges, and enforced resource limits. Health checks run on all services.
Access Controls
Authentication uses industry-standard JWT tokens with bcrypt(12) password hashing. Session tokens are cryptographically signed and verified on every request.
Pro tier scan data is isolated per user — domain ownership is verified via DNS TXT records before any scan is initiated. Cross-user data access is architecturally impossible.
Administrative access follows the principle of least privilege. No employee has standing access to customer scan data.
Incident Response
We monitor all infrastructure with automated health checks, uptime monitoring, and alerting. Anomalous behavior triggers immediate investigation.
In the event of a security incident affecting customer data, we commit to notifying affected users within 72 hours with a detailed incident report and remediation steps.
Our incident response process includes containment, evidence preservation, root cause analysis, remediation, and post-incident review.
Responsible Disclosure Policy
We welcome responsible security research on our platform. If you discover a vulnerability, we want to hear about it.
In Scope
- ✓*.arkensec.com web properties
- ✓ArkenSec API endpoints
- ✓Authentication and authorization
- ✓Data exposure vulnerabilities
Out of Scope
- ✕Social engineering or phishing
- ✕Denial of service attacks
- ✕Third-party services and integrations
- ✕Automated scanning without coordination
Report to
[email protected]Response SLA
Acknowledge within 48 hours
Safe harbor: We will not pursue legal action against researchers who report vulnerabilities in good faith, follow this policy, and do not access or modify other users' data. Triage within 5 business days of acknowledgment.
Pursuing SOC 2 Type II
Transparency is more credible than silence. Here's where we are.
Estimated completion: Q3 2026
Questions About Our Security?
We're happy to discuss our security practices in detail. Or explore our features and methodology.