Security

  • Encryption in transit; environment secrets in a credential vault.
  • Role-based access control; least-privilege and regular key rotation.
  • Immutable logs, anomaly detection, and incident playbooks.
  • Dependency scanning and SBOM tracking for supply-chain security.

For disclosures, contact support@standora.co.uk.