Security & Compliance

Last updated: January 1, 2024

Our Commitment to Security

At AnyMK, security is not an afterthought—it's built into every layer of our platform. We employ industry-leading security practices to protect your data and ensure the integrity of our services.

Data Encryption

We use encryption to protect your data both in transit and at rest:

  • In Transit: All data transmitted between your devices and our servers is encrypted using TLS 1.3 (Transport Layer Security)
  • At Rest: All data stored in our databases is encrypted using AES-256 encryption
  • Backups: All backup data is encrypted and stored in geographically distributed locations

Infrastructure Security

Our infrastructure is built on industry-leading cloud providers with robust security measures:

  • Multi-region deployment for high availability and disaster recovery
  • Automated security patching and updates
  • Network isolation and firewall protection
  • DDoS protection and rate limiting
  • Regular vulnerability scanning and penetration testing

Access Controls

We implement strict access controls to ensure only authorized personnel can access your data:

  • Multi-factor authentication (MFA) for all administrative access
  • Role-based access control (RBAC) with principle of least privilege
  • Comprehensive audit logging of all access and changes
  • Regular access reviews and revocation procedures
  • Secure key management and rotation

Application Security

Our development practices prioritize security at every stage:

  • Secure coding standards and code reviews
  • Automated security testing in CI/CD pipeline
  • Input validation and sanitization
  • Protection against OWASP Top 10 vulnerabilities
  • Regular security audits and assessments

Compliance & Certifications

We maintain compliance with industry standards and regulations:

  • SOC 2 Type II: Annual audits of our security, availability, and confidentiality controls
  • GDPR: Full compliance with EU General Data Protection Regulation
  • CCPA: Compliance with California Consumer Privacy Act
  • HIPAA: Available for healthcare customers requiring HIPAA compliance
  • ISO 27001: Information security management system certification (in progress)

Data Privacy

We respect your privacy and implement strong data protection measures:

  • Multi-tenant architecture with complete data isolation
  • Data residency options for compliance requirements
  • Right to data portability and deletion
  • Transparent data processing practices
  • No selling or sharing of customer data with third parties

Incident Response

We have a comprehensive incident response plan to handle security events:

  • 24/7 security monitoring and alerting
  • Dedicated incident response team
  • Defined escalation procedures
  • Customer notification within 72 hours of confirmed breach
  • Post-incident analysis and remediation

Employee Security

Our employees are trained and vetted to maintain security:

  • Background checks for all employees with data access
  • Regular security awareness training
  • Confidentiality and non-disclosure agreements
  • Secure device management and endpoint protection
  • Clear data handling and retention policies

Business Continuity

We ensure service availability and data protection through:

  • 99.9% uptime SLA for enterprise customers
  • Automated backups every 6 hours
  • Point-in-time recovery capabilities
  • Disaster recovery plan with defined RTOs and RPOs
  • Regular disaster recovery testing

Third-Party Security

We carefully vet all third-party service providers:

  • Security assessments of all vendors
  • Data processing agreements with strict security requirements
  • Regular vendor security reviews
  • Limited data sharing on need-to-know basis

Reporting Security Issues

If you discover a security vulnerability, please report it to us immediately:

Email: security@anymk.com
PGP Key: Available upon request

We appreciate responsible disclosure and will work with you to address any legitimate security concerns.

Security Updates

We continuously improve our security posture. This page is updated regularly to reflect our current security practices. For questions about our security program, please contact security@anymk.com.