Security

How We Protect Your Data

As a security company, we hold ourselves to the highest standards of information security. We are ISO 27001 certified, SOC 2 Type II audited, and designed from the ground up with European data protection requirements in mind.

ISO 27001:2022

Information security management system certified by an accredited third-party auditor.

SOC 2 Type II

Annual independent audit of our security, availability, and confidentiality controls.

GDPR Compliant

Full compliance with EU GDPR, including EU data residency options and DPA agreements.

EU Data Residency

All customer data processed and stored exclusively within EU data centres.

Our Security Controls

We apply the same rigour to protecting your data that our platform applies to discovering your organisation's vulnerabilities.

Encryption Everywhere

All data is encrypted in transit (TLS 1.3) and at rest (AES-256). Encryption keys are managed using AWS KMS with regular rotation. Customer data is encrypted with customer-specific keys.

Infrastructure Security

Cloud-native infrastructure deployed on AWS within EU regions. VPC isolation, security group controls, and private subnets ensure no unnecessary internet exposure. Infrastructure as Code with security scanning in CI/CD.

Access Controls

Role-based access control with principle of least privilege. MFA required for all employees. Privileged access management for production system access. Comprehensive audit logging of all access and changes.

Vulnerability Management

Continuous security scanning of our own infrastructure and code. Annual penetration testing by independent security firms. Responsible disclosure programme with public bug bounty.

Security Testing

Annual external penetration tests conducted by CREST-accredited firms. SAST and DAST scanning in CI/CD pipelines. Dependency vulnerability scanning with automated patching workflows.

Incident Response

Documented incident response procedures tested quarterly. Security incident notification to affected customers within 72 hours. Dedicated security incident hotline for customer escalations.

Data Privacy and GDPR

EU Data Residency

All customer data is stored and processed in AWS eu-west-1 (Ireland) and eu-central-1 (Frankfurt). No data is transferred outside the European Economic Area.

Data Processing Agreements

We provide GDPR-compliant Data Processing Agreements (DPAs) for all customers. Our DPA includes all required Article 28 clauses and covers sub-processor obligations.

Data Minimisation

We collect only the data necessary to deliver our services. Our scanning is entirely passive and externally-observable — we never access your internal systems or networks.

Data Retention

Security scan data is retained for 24 months to support historical trend analysis. Customer account data is deleted within 30 days of contract termination.

Responsible Disclosure

We believe in working with the security research community to identify and address vulnerabilities. If you have discovered a potential security issue in ThreatLens360, we want to hear from you.

Disclosure Guidelines
Email security@threatlens360.com with details of the vulnerability
Allow us 90 days to investigate and remediate before public disclosure
Do not access, modify, or delete customer data during research
We will acknowledge all valid reports and provide updates on remediation progress
We offer recognition and rewards for significant vulnerabilities
Report a Vulnerability