Security
Last Updated: March 2026
Our Commitment to Security
At Asquarei.ai, security is at the core of everything we build. We understand that our clients entrust us with sensitive business data and strategic information. We implement industry-leading security practices to ensure your data and systems remain protected at all times.
This Security Policy outlines the measures we take to safeguard your information and maintain the integrity, confidentiality, and availability of our services.
Infrastructure Security
Our infrastructure is designed with security as a foundational principle:
- All services are hosted on enterprise-grade cloud platforms with SOC 2 Type II certification
- Network segmentation and firewalls isolate critical systems from public-facing services
- Intrusion detection and prevention systems (IDS/IPS) monitor network traffic 24/7
- Regular vulnerability scanning and penetration testing are conducted by third-party security firms
- All infrastructure changes go through a formal change management process
Data Encryption
We employ robust encryption standards to protect your data both in transit and at rest:
- All data in transit is encrypted using TLS 1.2 or higher
- Data at rest is encrypted using AES-256 encryption
- Encryption keys are managed through dedicated key management services with strict access controls
- Database connections are encrypted and authenticated using certificate-based authentication
Access Control
We enforce strict access control policies to ensure that only authorized personnel can access sensitive systems and data:
- Role-based access control (RBAC) is implemented across all systems
- Multi-factor authentication (MFA) is required for all employee accounts
- Access permissions are reviewed and audited on a quarterly basis
- The principle of least privilege is applied to all system and data access
- All access to production systems is logged and monitored
Application Security
Our development practices incorporate security at every stage of the software development lifecycle:
- Secure coding practices are followed in accordance with OWASP guidelines
- All code undergoes peer review and automated security scanning before deployment
- Static and dynamic application security testing (SAST/DAST) are integrated into our CI/CD pipeline
- Dependencies are regularly audited and updated to address known vulnerabilities
- Web application firewalls (WAF) protect against common attack vectors
Incident Response
We maintain a comprehensive incident response plan to quickly identify, contain, and remediate security incidents:
- A dedicated security team monitors systems around the clock for potential threats
- Automated alerting systems notify our team of suspicious activities in real time
- A formal incident response plan is tested and updated regularly
- Affected parties are notified promptly in accordance with applicable regulations
- Post-incident reviews are conducted to identify root causes and prevent recurrence
Business Continuity & Disaster Recovery
We have robust business continuity and disaster recovery plans in place to ensure service availability:
- Automated backups are performed daily with geographically redundant storage
- Recovery time objectives (RTO) and recovery point objectives (RPO) are defined and regularly tested
- Failover mechanisms ensure minimal service disruption in the event of infrastructure failures
- Business continuity plans are reviewed and updated annually
Employee Security
Our team members are trained and held to high security standards:
- All employees undergo background checks prior to onboarding
- Mandatory security awareness training is conducted annually
- Employees sign confidentiality and non-disclosure agreements
- Security policies are regularly communicated and enforced across the organization
Compliance & Certifications
We adhere to internationally recognized security standards and frameworks:
- SOC 2 Type II compliance for data security and availability
- GDPR compliance for handling personal data of EU residents
- CCPA compliance for California consumer data protection
- Regular third-party audits to validate our security posture
Reporting Security Concerns
If you discover a security vulnerability or have concerns about the security of our services, please contact us immediately: