Security
Security at Kerios
Your data security is not a feature — it's a foundation.
🔐 End-to-End Encryption
All data is encrypted in transit (TLS 1.3) and at rest (AES-256). API credentials and sensitive configurations are encrypted with ChaCha20-Poly1305 AEAD, with per-tenant encryption keys.
🏗️ Tenant Isolation
Each client operates in a fully isolated environment. Row-level security in the database, separate encryption keys, and isolated AI agent contexts ensure no data leaks between tenants.
🚫 No Model Training on Your Data
We never use your business data to train or fine-tune AI models. Your data is processed solely to deliver the service and is never shared with third-party AI providers for training purposes.
🔍 Audit Logging
Every action is logged with full audit trails — who did what, when, and from where. Audit logs are immutable and available for export for your compliance needs.
🛡️ Access Control
Role-based access control (RBAC) with granular permissions. Multi-factor authentication, session management, and IP allowlisting available on Growth and Enterprise plans.
📋 Compliance
Our infrastructure is hosted on SOC 2 compliant providers. SOC 2 Type II certification for Kerios itself is on our roadmap. We support GDPR data subject requests and provide Data Processing Agreements (DPA) on request.
Infrastructure
- Hosted on enterprise-grade cloud infrastructure (GCP/AWS)
- Automated backups with point-in-time recovery
- DDoS protection and Web Application Firewall (WAF)
- Regular penetration testing by independent security firms
- Dependency scanning and vulnerability monitoring in CI/CD
Responsible Disclosure
If you discover a security vulnerability, please report it to security@kerios.ai. We take all reports seriously and will respond within 48 hours.
Questions?
For security-related inquiries, contact security@kerios.ai.