Skip to main content

Security & Privacy

Your data security is our top priority. Learn how we protect your information and maintain compliance.

Enterprise-Grade Security

Enterprise-grade security practices. GDPR compliant, and encrypted at rest and in transit.

πŸ”’ Data Encryption

Encryption at Rest

  • AES-256 encryption - All data stored in our databases is encrypted using industry-standard AES-256
  • Encrypted backups - Database backups are encrypted before being stored
  • Secure key management - Encryption keys stored in AWS KMS with automatic rotation
  • Environment separation - Production data never touches development environments

Encryption in Transit

  • TLS 1.3 - All API communication uses modern TLS 1.3 encryption
  • HTTPS only - No unencrypted HTTP traffic allowed
  • Certificate pinning - Mobile apps use certificate pinning to prevent MITM attacks
  • VPN for internal services - All internal service communication over encrypted VPN

πŸ”‘ Authentication & Access Control

User Authentication

  • Multi-factor authentication (MFA) - Optional 2FA via SMS or authenticator app
  • SSO support - Enterprise plans include SAML 2.0 single sign-on
  • Password requirements - Minimum 12 characters with complexity requirements
  • Session management - Automatic logout after 30 days of inactivity

API Authentication

  • API keys with scopes - Generate keys with limited permissions
  • OAuth 2.0 - Standard OAuth flows for third-party integrations
  • Webhook signatures - HMAC-SHA256 signatures on all webhook payloads
  • Rate limiting - Prevent abuse with intelligent rate limits

Webhook Signature Verification

const crypto = require('crypto');

function verifyWebhookSignature(payload, signature, secret) {
  const hmac = crypto.createHmac('sha256', secret);
  const expectedSignature = hmac.update(payload).digest('hex');
  
  return crypto.timingSafeEqual(
    Buffer.from(signature),
    Buffer.from(expectedSignature)
  );
}

πŸ›‘οΈ Compliance Certifications

Enterprise Security

Enterprise-grade practices

Independent verification of our security controls, availability, and confidentiality measures.

GDPR Compliant

EU data protection

Full compliance with EU General Data Protection Regulation including data portability and right to deletion.

CCPA Compliant

California privacy law

Compliance with California Consumer Privacy Act including opt-out mechanisms and data disclosure.

HIPAA Ready

Healthcare data

Enterprise plans include Business Associate Agreement (BAA) for handling protected health information.

πŸ” Data Privacy

Data Minimization

  • Only collect what's needed - We don't store data we don't use
  • Automatic data expiry - Logs automatically deleted after 90 days
  • Anonymization - PII removed from analytics and debugging data
  • Data residency options - Choose where your data is stored (US, EU, Asia)

User Rights

  • Right to access - Export all your data at any time via dashboard or API
  • Right to deletion - Delete your account and all associated data permanently
  • Right to portability - Download data in machine-readable JSON format
  • Right to correction - Update incorrect information through your account settings

Data Export

You can export all your data from your account dashboard:

  1. Go to Settings β†’ Privacy & Data
  2. Click "Export My Data"
  3. Receive download link via email within 24 hours
  4. Download includes all agents, executions, logs, and configurations

🏒 Infrastructure Security

Cloud Hosting

  • AWS infrastructure - Hosted on Amazon Web Services with 99.99% uptime SLA
  • Multi-region redundancy - Data replicated across multiple availability zones
  • DDoS protection - AWS Shield and CloudFlare for DDoS mitigation
  • Automated backups - Daily encrypted backups with 30-day retention

Network Security

  • Virtual Private Cloud (VPC) - Isolated network environment
  • Web Application Firewall - AWS WAF protects against common exploits
  • Intrusion detection - Real-time monitoring for suspicious activity
  • IP allowlisting - Restrict API access to specific IPs (Enterprise)

πŸ‘οΈ Monitoring & Auditing

Activity Logs

  • User activity tracking - All login attempts, configuration changes logged
  • API access logs - Complete audit trail of API requests
  • Agent execution logs - Full history of what agents did and when
  • Integration logs - Track data flowing to/from third-party services

Security Monitoring

  • 24/7 security operations - Round-the-clock monitoring for threats
  • Anomaly detection - Machine learning models detect unusual patterns
  • Incident response team - Dedicated team for security incidents
  • Vulnerability scanning - Weekly automated security scans

🀝 Third-Party Integrations

Integration Security

  • OAuth flows - Never store your third-party passwords
  • Scoped permissions - Only request minimum necessary permissions
  • Token encryption - Access tokens encrypted at rest
  • Token refresh - Automatic token rotation for security

Vendor Security

  • Vendor assessments - All integrations undergo security review
  • Data Processing Agreements - DPAs with all sub-processors
  • Regular audits - Quarterly review of third-party security posture
  • Incident coordination - Direct communication channel with vendor security teams

Integration Permissions

You can revoke integration permissions at any time from your account settings. This immediately stops data flow.

🚨 Incident Response

Our Commitment

  • Immediate notification - We'll notify you within 24 hours of any security incident
  • Transparent communication - Regular updates throughout incident investigation
  • Post-incident review - Detailed report with lessons learned and improvements
  • Compensation policy - Service credits for SLA breaches due to security incidents

Report a Vulnerability

We take security seriously and welcome reports from security researchers. If you discover a vulnerability:

  1. Email security@inteliworks.io with details
  2. Include steps to reproduce the vulnerability
  3. Allow us 90 days to patch before public disclosure
  4. Receive recognition in our Hall of Fame (with permission)

Bug Bounty Program

We reward security researchers who responsibly disclose vulnerabilities:

  • Critical: $5,000 - $10,000
  • High: $2,000 - $5,000
  • Medium: $500 - $2,000
  • Low: $100 - $500

πŸ“‹ Security Questionnaire

Need to complete a security questionnaire for procurement? We've got you covered:

Have Security Questions?

Our security team is here to help with compliance requirements and security assessments.

Contact Security Team
1
πŸ€–
Inteliworks Support
Online β€’ Replies instantly
πŸ€–

Hi there! πŸ‘‹ I can answer your questions about Inteliworks. What would you like to know?

Common questions:

Powered by AI β€’ Talk to a human

Starting at
$797/mo
Start Free Trial β†’
No card needed Cancel anytime