Security Policy

Security is embedded in our product decisions, infrastructure, and culture. This policy explains how we safeguard the work you entrust to Concize.

1. Platform Security

Concize runs on hardened cloud infrastructure with network segmentation, container isolation, and automated patching. All data is encrypted in transit with TLS 1.2+ and at rest using AES-256.

1.1 Access Controls

Production access is governed by role-based permissions, short-lived credentials, and hardware security keys. Every action is logged and monitored.

1.2 Application Security

  • Secure SDLC with peer review, automated testing, and dependency scanning.
  • Annual 3rd-party penetration testing with remediation tracking.
  • Bug bounty program rewarding responsible disclosure (security@concize.com).

2. Data Protection

Each workspace lives in a logically isolated namespace. Customer Content is replicated across availability zones and backed up hourly with 30-day retention.

3. Compliance & Governance

Concize aligns with SOC 2 principles and GDPR requirements. We maintain a living risk register, conduct regular incident response drills, and train every employee on security best practices.

4. Business Continuity

We maintain redundant infrastructure, automated failover, and tested disaster recovery procedures to meet a 99.9% uptime commitment. Status is published at status.concize.com.

5. Customer Responsibilities

Admins should enforce SSO or MFA, manage role assignments, audit integrations, and configure workspace retention policies to match internal governance.

6. Reporting & Response

Report suspected security incidents to security@concize.com. We acknowledge within 24 hours and share updates throughout the investigation.