Security at Clodo
We take security seriously. Your data is protected with enterprise-grade security measures.
Encryption
All data is encrypted at rest using AES-256 and in transit using TLS 1.3.
Infrastructure
Hosted on enterprise-grade infrastructure with multiple redundancy layers.
Access Control
Role-based access control (RBAC) with SSO and MFA support.
Compliance
SOC 2 Type II certified with GDPR and CCPA compliance.
Monitoring
24/7 security monitoring with automated threat detection.
Penetration Testing
Regular third-party security audits and penetration testing.
Security Practices
Data Protection
All customer data is encrypted using industry-standard AES-256 encryption at rest. Data in transit is protected using TLS 1.3 encryption. We maintain strict access controls and audit logs for all data access.
Infrastructure Security
Our infrastructure is hosted in SOC 2 compliant data centers with multiple layers of physical and network security. We employ network segmentation, intrusion detection systems, and regular vulnerability scanning.
Incident Response
We maintain a comprehensive incident response plan with defined procedures for detection, containment, eradication, and recovery. Our security team is available 24/7 to respond to potential threats.
Responsible Disclosure
We welcome security researchers to report vulnerabilities through our responsible disclosure program. Please contact security@clodo.co for any security concerns.