Security

Security is built in, not bolted on

We safeguard customer conversations with layered controls, rigorous reviews, and transparent processes. This page summarizes our security posture. Last updated: December 15, 2025.

Defense in depth

Layered controls across identity, network, application, and data to reduce risk.

Least privilege

Role-based access, audited elevation, and segmented environments for sensitive systems.

Continuous monitoring

Telemetry, alerting, and runbooks to detect anomalies and respond quickly.

Operational practices

  • Encryption in transit (TLS 1.2+) and at rest for customer data and secrets.

  • SSO support for workspaces plus enforced MFA for internal admin access.

  • Hardened production environments with least-privilege IAM and network segmentation.

  • Regular backups, tested restores, and disaster recovery plans with defined RPO/RTO targets.

  • Secure SDLC: code review, dependency scanning, and environment-specific secrets management.

  • Vendor reviews and data processing agreements for subprocessors handling customer data.

Incident response

  • 24/7 monitoring for availability and security events with documented escalation paths.

  • Incident playbooks, post-incident reviews, and customer communication for material issues.

  • Data deletion or export support aligned to our Privacy Policy and workspace settings.

Report a concern

Found a vulnerability or suspicious activity? Please let us know. We appreciate responsible disclosure and will respond quickly.

security@aeroinbox.comResponsible disclosure welcome