Security at RISKCORE
Your risk data deserves bank-grade protection. Here's how we deliver it.
Last updated: January 2025
AES-256
Encryption at Rest
TLS 1.3
Encryption in Transit
GDPR
Compliant
Self-Hosted
Option Available
1. Security Overview
At RISKCORE, security is not an afterthought—it's foundational to everything we build. We understand that our customers manage billions in assets and require the highest levels of data protection.
Our security program is built on three core principles:
- Defense in Depth: Multiple layers of security controls
- Least Privilege: Minimal access rights by default
- Transparency: Open-source core for full auditability
2. Compliance & Certifications
Current Status
- GDPR Compliant
Full compliance with UK and EU data protection regulations
- Security Controls Implemented
Bank-grade encryption, access controls, and monitoring in place
In Progress
- SOC 2 Type II Certification
Currently undergoing the SOC 2 compliance process with third-party auditors
- Penetration Testing
Scheduling independent security assessments by certified professionals
We are committed to achieving the highest security standards. Enterprise customers can request our current security documentation and compliance roadmap.
3. Data Encryption
Encryption at Rest
- All data encrypted using AES-256 encryption
- Database encryption with customer-specific keys (Enterprise)
- Encrypted backups stored in geographically distributed locations
- Secure key management using hardware security modules (HSM)
Encryption in Transit
- TLS 1.3 for all data transmission
- HSTS enabled with minimum 1-year max-age
- Certificate pinning available for mobile applications
- Perfect Forward Secrecy (PFS) enabled
4. Infrastructure Security
Our cloud infrastructure is hosted on leading providers with SOC 2 and ISO 27001 certifications:
- Network isolation using Virtual Private Clouds (VPC)
- Web Application Firewall (WAF) protection
- DDoS mitigation at network edge
- Regular vulnerability scanning and patching
- Immutable infrastructure with automated deployments
- Geographic redundancy with automatic failover
5. Access Control
User Access
- Role-based access control (RBAC) with granular permissions
- Multi-factor authentication (MFA) support
- SSO/SAML integration for Enterprise customers
- Session timeout and automatic logout
- IP allowlisting available
Internal Access
- Principle of least privilege for all employees
- Background checks for all team members
- Access reviews conducted quarterly
- All access logged and auditable
- No standing access to production data
6. Self-Hosted Option
Maximum Control
For organizations with strict data residency requirements or internal policies, RISKCORE can be deployed entirely within your own infrastructure.
Self-hosted benefits include:
- Data never leaves your network — Complete data sovereignty
- Your security controls — Integrate with existing security infrastructure
- Air-gapped deployments — Available for highly sensitive environments
- Custom retention policies — Full control over data lifecycle
7. Data Handling
Data Isolation
Each customer's data is logically isolated. We use separate database schemas and encryption keys to ensure complete data segregation between tenants.
Data Retention
- Customer-configurable retention policies
- Secure deletion upon request or account termination
- 30-day maximum for complete data purge
No Data Selling
We will never sell, share, or monetize your data. Your risk data is used solely to provide our services to you.
8. Monitoring & Incident Response
Continuous Monitoring
- 24/7 automated threat detection
- Real-time alerting on anomalous activity
- Comprehensive audit logging
- Log retention for 12+ months
Incident Response
- Documented incident response procedures
- Dedicated security response team
- Customer notification within 72 hours of confirmed breach
- Post-incident reviews and continuous improvement
9. Vendor Security
We carefully vet all third-party vendors and require:
- SOC 2 or equivalent certification
- Data Processing Agreements (DPAs)
- Regular security assessments
- Minimal data sharing principles
10. Security Contact
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Report a Vulnerability
Email: security@riskcore.io
For general security questions: hello@riskcore.io
Enterprise customers can request our full security documentation, including SOC 2 reports, penetration test summaries, and completed security questionnaires.