πŸ”’ Security & Trust Center

Security by Design,
Transparency by Default

At Admin, we treat security as a core feature, not an afterthought. This page details our infrastructure, compliance certifications, data protection practices, and incident response protocols.

Core Security Principles

Every architectural decision and operational process at Admin is guided by these foundational principles.

πŸ›‘οΈ

Zero Trust Architecture

We assume breach. Every request is authenticated, authorized, and encrypted regardless of origin. Network segmentation and micro-segmentation isolate critical workloads.

πŸ”‘

Least Privilege Access

Access rights are strictly scoped and time-bound. Role-based access control (RBAC) and just-in-time elevation ensure users and services only access what they need.

πŸ”„

Continuous Monitoring

24/7 automated threat detection, real-time log aggregation, and anomaly detection systems ensure rapid identification and mitigation of potential threats.

πŸ“¦

Secure Development Lifecycle

Security is integrated into every phase: threat modeling, SAST/DAST scanning, dependency auditing, and peer-reviewed code changes before deployment.

🌍

Data Sovereignty

We respect regional data residency requirements. Customers can select data regions, and we ensure compliance with local jurisdictional regulations.

πŸ”

Third-Party Risk Management

Strict vendor assessment frameworks, continuous monitoring of supply chain dependencies, and mandatory security reviews for all integrations and partnerships.

Compliance & Certifications

We maintain rigorous standards to protect your data and ensure regulatory alignment across industries.

πŸ“œ

SOC 2 Type II

Annual independent audit

Certified
🌐

ISO 27001:2022

Information Security Management

Certified
πŸ‡ͺπŸ‡Ί

GDPR Compliant

EU Data Protection Regulation

Compliant
πŸ‡ΊπŸ‡Έ

CCPA / CPRA

California Consumer Privacy

Compliant
πŸ₯

HIPAA BAA

Available upon request

Available
πŸ›‘οΈ

PCI DSS Level 1

Payment Card Industry Standards

Certified

Audit reports and compliance documentation are available for enterprise customers via our Trust Portal. Request Access β†’

Infrastructure & Data Protection

We engineer our systems to withstand sophisticated attacks while maintaining high availability and performance. Your data is protected with industry-leading encryption and strict access controls.

Encryption at Rest

AES-256 encryption for all stored data. Customer-managed keys (CMK) and HSM-backed key rotation available.

Encryption in Transit

TLS 1.3 enforced across all endpoints. Certificate pinning and HSTS enabled to prevent downgrade attacks.

Network Security

DDoS mitigation, Web Application Firewalls (WAF), strict egress filtering, and private connectivity options (VPC Peering, PrivateLink).

Backup & Recovery

Automated daily backups with 30-day retention. Geo-redundant storage and tested disaster recovery procedures with RPO < 1hr, RTO < 4hrs.

Incident Response & Transparency

We maintain a documented, tested, and continuously improved incident response program aligned with industry best practices.

1. Detection & Triage

Automated monitoring systems flag anomalies. Security operations team validates severity within 15 minutes.

\n

2. Containment & Analysis

Immediate isolation of affected systems. Forensic analysis begins to determine root cause and scope of impact.

3. Customer Communication

Transparent, timely updates provided via status page and designated security contacts. No speculation, only verified facts.

4. Remediation & Recovery

Systems patched, configurations restored, and validation tests executed before service resumption.

5. Post-Incident Review

Comprehensive post-mortem conducted within 14 days. Findings shared internally and applicable improvements implemented.

Responsible Disclosure & Bug Bounty

We welcome security researchers to help us improve. If you discover a vulnerability, report it responsibly. We reward valid findings and maintain a safe harbor policy for ethical testing.

Submit a Report
Critical
Up to $15,000
High
Up to $5,000
Medium
Up to $1,500
Low
$250 - $750

Full program details, scope, and testing guidelines available at /security.txt

Security FAQs

Answers to common questions about our security practices and data handling.

Where is customer data stored?

Data is hosted in ISO 27001 and SOC 2 certified cloud regions. Enterprise customers can select specific geographic regions for data residency compliance. We never sell or share your data with third parties.

How do you handle access to customer data?

Admin employees access customer data only on a strict need-to-know basis. All access is logged, time-bound, and requires multi-factor authentication. Automated sessions expire after inactivity.

What happens if there's a security incident?

We follow a documented IR playbook. Affected customers are notified within 72 hours of confirmation. We provide a public post-mortem and implement preventive measures within 14 days.

Do you support SSO and MFA?

Yes. We support SAML 2.0 and OIDC for enterprise SSO. Multi-factor authentication is enforced for all admin accounts and recommended for all users via TOTP, FIDO2/WebAuthn, or hardware keys.

Can I export or delete my data?

Absolutely. You can export your data in standard formats (JSON, CSV) at any time. Upon account deletion, all data is permanently erased from active and backup systems within 30 days, with cryptographic proof available on request.

Security Contact & Resources

Have questions about our security practices, need a custom compliance addendum, or want to report a vulnerability?