Security at Flurit AI
Security is fundamental to everything we do. Learn about our comprehensive approach to protecting your infrastructure and data.
Last updated: January 2025
At Flurit AI, security isn't just a feature—it's the foundation of our platform. We understand that you're trusting us with your critical infrastructure and sensitive data. Our comprehensive security program is designed to protect your assets while enabling seamless DevOps automation.
Our Security Commitment
Enterprise-Grade Protection
Built with security-first architecture and industry best practices to safeguard your infrastructure.
Continuous Monitoring
24/7 security monitoring and threat detection to identify and respond to potential issues.
Transparent Practices
Open communication about our security measures and regular updates on our security posture.
Data Privacy
Your data remains yours. We never share or use your infrastructure data for any purpose other than providing our service.
Data Security & Privacy
Encryption
We employ military-grade encryption to protect your data at every stage:
- Data in Transit: All data transmitted between your systems and Flurit AI is encrypted using TLS 1.3+ with strong cipher suites
- Data at Rest: All stored data is encrypted using AES-256 encryption standards
- Key Management: Encryption keys are managed using industry-standard key management systems with regular rotation policies
- End-to-End Protection: Sensitive credentials and secrets are encrypted with additional layers of protection
Infrastructure Security
Our infrastructure is built on secure, reliable cloud platforms with multiple layers of protection:
- Cloud Infrastructure: Hosted on AWS with physically secure data centers and redundant systems
- Network Security: Multi-layered firewalls, intrusion detection systems, and DDoS protection
- Isolated Environments: Customer data is logically separated and isolated in dedicated environments
- Backup & Recovery: Regular automated backups with tested disaster recovery procedures
- High Availability: Redundant systems across multiple availability zones for maximum uptime
Data Retention & Deletion
We maintain strict data retention policies:
- Data is retained only as long as necessary for service delivery and legal obligations
- You maintain full ownership and control of your infrastructure data
- Secure data deletion procedures when you terminate your account
- Regular purging of unnecessary logs and temporary data
Access Control & Authentication
Authentication & Authorization
- Multi-Factor Authentication (MFA): Enforced for all user accounts to prevent unauthorized access
- Single Sign-On (SSO): Support for enterprise SSO providers (SAML, OAuth 2.0)
- Role-Based Access Control (RBAC): Granular permissions based on user roles and responsibilities
- Session Management: Automatic session expiration and secure token handling
- API Authentication: Secure API key management with scoped permissions
Principle of Least Privilege
We implement least privilege access controls throughout our platform:
- Users and services receive only the minimum permissions necessary
- Regular access reviews and permission audits
- Automated access revocation for inactive accounts
- Time-limited elevated access for administrative tasks
Cloud Provider Credentials
Your cloud provider credentials are handled with extreme care:
- Read-only access by default for infrastructure discovery
- Credentials encrypted with additional encryption layers
- Support for temporary credentials and IAM roles where possible
- Regular credential rotation recommendations
- Secure credential storage using industry-standard secret management
Security Operations
Monitoring & Incident Response
- 24/7 Monitoring: Continuous security monitoring and alerting systems
- Threat Detection: Advanced threat detection and automated response mechanisms
- Incident Response Plan: Documented procedures for security incident handling
- Security Team: Dedicated security team available to respond to incidents
- Logging & Auditing: Comprehensive audit logs for security analysis and forensics
Vulnerability Management
- Regular security assessments and penetration testing by third-party experts
- Automated vulnerability scanning of our infrastructure and applications
- Rapid patching process for identified vulnerabilities
- Bug bounty program to encourage responsible disclosure
- Regular security updates and maintenance windows
Secure Development
- Security by Design: Security considerations integrated from the start of development
- Code Reviews: Mandatory security-focused code reviews before deployment
- Static Analysis: Automated security scanning in our CI/CD pipeline
- Dependency Management: Regular updates and security scanning of third-party libraries
- Security Training: Ongoing security training for all engineering team members
Business Continuity & Disaster Recovery
We maintain comprehensive business continuity and disaster recovery plans to ensure service reliability:
- Automated Backups: Multiple daily backups with geographic redundancy
- Recovery Time Objective (RTO): Target of 4 hours for full service restoration
- Recovery Point Objective (RPO): Maximum data loss of 1 hour
- Regular Testing: Quarterly disaster recovery drills and failover testing
- Geographic Redundancy: Data replicated across multiple regions
- Status Page: Real-time status updates and incident notifications
Third-Party Security
We carefully vet all third-party vendors and services that process customer data:
- Vendor Assessment: Security reviews before onboarding any third-party service
- Data Processing Agreements: Formal agreements with all vendors handling customer data
- Minimal Data Sharing: Only essential data shared with third parties
- Regular Reviews: Ongoing monitoring of vendor security practices
- Subprocessors: List of subprocessors available in our Privacy Policy
Current Third Parties: We use AWS for infrastructure hosting, Clerk for authentication, and Amplitude for analytics. Each has been thoroughly vetted for security and compliance. See our Privacy Policy for complete details.
Responsible Disclosure
We value the security research community and encourage responsible disclosure of security vulnerabilities. If you discover a potential security issue, please help us keep our users safe by following these guidelines:
How to Report
- Email security concerns to founders@flurit.ai with subject line "Security Vulnerability Report"
- Provide detailed information about the vulnerability, including steps to reproduce
- Allow us reasonable time to address the issue before public disclosure
- Do not access, modify, or delete user data without authorization
- Do not perform actions that could harm our users or disrupt our services
Our Commitment
- Acknowledge receipt of your report within 48 hours
- Provide regular updates on our progress investigating and addressing the issue
- Credit researchers who report valid security issues (unless they prefer to remain anonymous)
- Not pursue legal action against researchers who follow these guidelines
Employee Security Practices
Our employees are our first line of defense. We maintain strict security practices for all team members:
- Background Checks: Comprehensive background checks for all employees
- Security Training: Mandatory security awareness training for all employees
- Confidentiality Agreements: All employees sign NDAs and security policies
- Device Management: Company devices with full-disk encryption and security software
- Access Reviews: Regular reviews of employee access to systems and data
- Offboarding: Immediate access revocation upon employee departure
Security Questions?
We're committed to transparency about our security practices. If you have questions about our security measures, need additional documentation, or want to report a security concern, please contact us:
Flurit AI Security Team
General Security Inquiries: founders@flurit.ai
Vulnerability Reports: founders@flurit.ai (Subject: Security Vulnerability Report)
Website: https://flurit.ai
This security page is updated regularly to reflect our current security practices and certifications. For the most up-to-date information about data handling and privacy, please also refer to our Privacy Policy and Terms of Service.