Security at CronOps
Your security is our top priority. Learn how we protect your data.
End-to-End Encryption
All data is encrypted in transit and at rest using industry-standard AES-256 encryption.
Secure Authentication
JWT-based authentication with refresh tokens and secure password hashing using bcrypt.
Infrastructure Security
Our infrastructure is hosted on secure, SOC 2 compliant cloud providers with regular audits.
Access Controls
Role-based access control ensures users only see what they're authorized to access.
Regular Audits
We conduct regular security audits and penetration testing to identify vulnerabilities.
DDoS Protection
Enterprise-grade DDoS protection ensures your services remain available.
Report a Vulnerability
If you discover a security vulnerability, please report it responsibly to security@cronops.dev