logo

Security Policy

Last updated: December 25, 2025

At CostKatana, security is fundamental to everything we do. This Security Policy outlines our commitment to protecting your data, our infrastructure, and the measures we take to ensure the highest levels of security for our AI cost optimization platform.

1. Data Protection

We implement comprehensive data protection measures to safeguard your information:

  • Encryption: All data in transit is encrypted using TLS 1.3, and data at rest is encrypted using AES-256 encryption
  • Data Isolation: Customer data is logically separated and isolated to prevent unauthorized access
  • Backup and Recovery: Regular automated backups with point-in-time recovery capabilities
  • Data Minimization: We only collect and store data necessary for service delivery
  • Secure Deletion: When data is deleted, it is permanently removed using secure deletion methods

2. Infrastructure Security

Our infrastructure is built on industry-leading cloud platforms with robust security controls:

  • Cloud Security: Hosted on AWS with enterprise-grade security controls and compliance certifications
  • Network Security: Firewalls, DDoS protection, and intrusion detection systems
  • Access Controls: Multi-factor authentication (MFA) required for all administrative access
  • Monitoring: 24/7 security monitoring and automated threat detection
  • Vulnerability Management: Regular security assessments and penetration testing
  • Incident Response: Established procedures for rapid response to security incidents

3. Application Security

We follow secure development practices to build and maintain secure applications:

  • Secure Coding: Code reviews, static analysis, and security testing throughout development
  • Authentication: Strong password requirements, MFA support, and secure session management
  • API Security: API keys are encrypted, rate-limited, and can be revoked at any time
  • Input Validation: All user inputs are validated and sanitized to prevent injection attacks
  • Dependency Management: Regular updates and security patches for all dependencies
  • Security Headers: Implementation of security headers to prevent common web vulnerabilities

4. Compliance and Certifications

We maintain compliance with industry standards and regulations:

  • GDPR: Compliant with General Data Protection Regulation requirements
  • SOC 2: Working towards SOC 2 Type II certification
  • ISO 27001: Following ISO 27001 security management standards
  • Regular Audits: Third-party security audits and assessments
  • Privacy by Design: Security and privacy considerations integrated into all product development

5. Access Control and Authentication

We implement strict access controls to protect your account and data:

  • Multi-Factor Authentication: MFA available for all user accounts to add an extra layer of security
  • Role-Based Access: Granular permissions and role-based access control (RBAC)
  • Session Management: Secure session tokens with automatic expiration
  • Account Monitoring: Activity logs and alerts for suspicious account activity
  • Password Security: Strong password requirements and secure password hashing
  • API Key Management: Secure storage and management of API keys with rotation capabilities

6. Incident Response

We have established procedures for responding to security incidents:

  • Detection: Automated monitoring and alerting for security events
  • Response Team: Dedicated security team available 24/7
  • Containment: Rapid containment procedures to limit impact
  • Notification: Transparent communication with affected users in case of a breach
  • Recovery: Procedures for system recovery and data restoration
  • Post-Incident Review: Analysis and improvements following any security incident

7. Third-Party Security

We carefully vet and monitor third-party services and integrations:

  • Vendor Assessment: Security assessments of all third-party vendors
  • Data Processing Agreements: Contracts ensuring third parties meet our security standards
  • Monitoring: Ongoing monitoring of third-party security practices
  • Limited Access: Third parties only have access to data necessary for their services

8. User Security Responsibilities

While we implement comprehensive security measures, users also play a crucial role in security:

  • Strong Passwords: Use strong, unique passwords for your account
  • Enable MFA: Activate multi-factor authentication for additional security
  • Secure API Keys: Keep your API keys confidential and rotate them regularly
  • Monitor Activity: Regularly review your account activity and access logs
  • Report Issues: Immediately report any suspicious activity or security concerns
  • Keep Software Updated: Ensure your systems and applications are up to date

9. Security Updates and Maintenance

We continuously improve our security posture:

  • Regular Updates: Prompt application of security patches and updates
  • Security Training: Ongoing security training for all employees
  • Threat Intelligence: Monitoring of emerging threats and vulnerabilities
  • Security Reviews: Regular security architecture reviews
  • Penetration Testing: Regular third-party penetration testing

10. Reporting Security Issues

We encourage responsible disclosure of security vulnerabilities. If you discover a security issue, please:

  • Report it to us immediately at the contact information below
  • Provide detailed information about the vulnerability
  • Allow us reasonable time to address the issue before public disclosure
  • Do not exploit the vulnerability or access data beyond what is necessary to demonstrate it

Security Team: support@costkatana.com

11. Changes to This Security Policy

We may update this Security Policy from time to time to reflect changes in our security practices or applicable laws. We will notify you of any material changes by posting the updated policy on this page and updating the "Last updated" date.

12. Contact Us

If you have any questions about this Security Policy or our security practices, please contact us:

Security Inquiries: support@costkatana.com

General Support: support@costkatana.com