Security


We recognize the importance of excellent security practices. While we are a small team, we work hard to punch above our weight on security.

This document covers our security practices and policies. If you are interested in the data we collect and store, please see our privacy policy.

General practices

  • Our architecture is built to with strict access controls, comprehensive auditing, and continuous monitoring.
  • We adopt a Zero Trust model across communications, ensuring identity verification, least-privilege access, and endpoint validation across our systems.
  • Access to servers, source code, and third-party tools are secured with two-factor auth.
  • We use automatic security vulnerability detection tools to alert us when our dependencies have known security issues. We are aggressive about applying patches and deploying quickly.

Access control and organizational security

Personnel

Our employees sign an NDA.

Penetration testing

We perform a penetration test through a third party annually.

Servers

Radiant Intel hosts our own servers in Google Cloud

Encryption

All communication between the Radiant Intel client and our backend is encrypted with TLS 1.2. Our backend server is managed by Google Cloud.

Data retention/logging

Logs are stored separate from our backend infrastructure in a private Google Cloud Logging bucket with limited access. This bucket is not accessible to any third parties.

These logs are retained for 30 days, after which they are permanently deleted.

Application analytics can be permanently deleted on request.

Vulnerability detection

Both the client and our backend are regularly scanned for dependencies with known security vulnerabilities.

Vulnerable dependencies are patched and redeployed rapidly.

Hosting

Our backend server is hosted on Google Cloud. Googles’s data center operations have been accredited under:

  • ISO 27001
  • SOC 1 / SOC 2
  • and more

FAQs

How do I report a potential vulnerability or security concern?

If you have a concern please email us at [email protected]

Are you SOC 2 certified?

We are working towards this and expect to be certified in the next 6 months.

Do you conduct background checks on your employees?

Yes. All employees sign an NDA and undergo a background check before starting.

Any further questions?

Great! Please email us and we’ll happily update this doc.

Are you sure?