CronOps

Security at CronOps

Your security is our top priority. Learn how we protect your data.

End-to-End Encryption

All data is encrypted in transit and at rest using industry-standard AES-256 encryption.

Secure Authentication

JWT-based authentication with refresh tokens and secure password hashing using bcrypt.

Infrastructure Security

Our infrastructure is hosted on secure, SOC 2 compliant cloud providers with regular audits.

Access Controls

Role-based access control ensures users only see what they're authorized to access.

Regular Audits

We conduct regular security audits and penetration testing to identify vulnerabilities.

DDoS Protection

Enterprise-grade DDoS protection ensures your services remain available.

Report a Vulnerability

If you discover a security vulnerability, please report it responsibly to security@cronops.dev