Security at Condelo

Our approach to securing the platform, protecting customer data, and maintaining operational resilience.

Security by Design

SOC 2 Type II

Zero Trust

Security Architecture

Condelo employs a defense-in-depth approach to security, layering multiple controls across infrastructure, application, and data tiers. Every component is designed with the assumption that any single layer may be compromised, ensuring that no single point of failure can expose customer data. Our architecture follows zero trust principles — every request is authenticated, authorised, and encrypted regardless of its origin.

Infrastructure Security

Network

VPC isolation, WAF, DDoS protection, encrypted transit

Compute

Container isolation, immutable deployments, automated patching

Storage

AES-256 encryption at rest, key rotation, backup encryption

Monitoring

24/7 alerting, anomaly detection, audit logging

Data Protection

End-to-end encryption for data in transit (TLS 1.3)
AES-256 encryption at rest for all stored data
Customer-managed encryption keys (BYOK) available
Data isolation between tenants via row-level security
Automated data classification and handling

Access Control

  • Role-based access control (RBAC) — granular permissions per role
  • Multi-factor authentication — enforced for all users
  • SSO integration — SAML 2.0 / OIDC supported
  • Least-privilege principle — minimal permissions by default
  • Regular access reviews — quarterly audit of all access rights

Incident Response

SeverityResponse TimeEscalation
P1 Critical15 minCTO + on-call
P2 High1 hourEngineering lead
P3 Medium4 hoursAssigned engineer
P4 Low24 hoursBacklog triage

Vulnerability Management

Automated dependency scanning (Dependabot)
Regular penetration testing
Responsible disclosure programme
90-day patch SLA for non-critical
24-hour patch SLA for critical

Compliance

Condelo is pursuing SOC 2 Type II certification and has ISO 27001 on its compliance roadmap. Our security programme is aligned with GDPR requirements for data protection, and we maintain comprehensive documentation of our controls, policies, and procedures. Regular third-party audits validate our security posture and identify areas for continuous improvement.

Making the unknown, known.

© 2026 Condelo. All rights reserved.