Our Security Foundations
At Ellinomos, security is embedded into every layer of our infrastructure. We follow these core principles:
-
Zero-Trust Architecture
All requests require authentication, authorization, and encryption
-
Transparency
Regular public attestation of system designs and audits
-
Defensive Layers
Multi-phase security validation with runtime protections
-
Open Governance
Community-reviewed crypto protocols and access controls
Technical Implementation
256-Bit Encryption
TLS 1.3 with forward secrecy for all services
Access Controls
RBAC with continuous privilege validation
Threat Protection
Real-time monitoring with AI anomaly detection
Red Team Testing
Quarterly penetration audits by independent experts
Compliance & Certifications
We uphold the highest standards through the following certifications:
- ISO/IEC 27001:2022 Information Security Management
- ISO 27701 for Privacy Governance
- CERT-CC Vulnerability Reporting
- EU General Data Protection Regulation (GDPR)
- Certified Cloud Security (CCS)
- Open Web Application Security Project (OWASP)
Data Lifecycle
Our security strategy covers every phase of data handling:
Ingestion
Encrypted at ingestion
Storage
AES-256 at rest
Transit
HMAC SHA-256 in transit
Vulnerability Disclosure
We follow a responsible disclosure policy. If you discover issues in our service, please contact our team via:
Our dedicated security email
Report via public issue boards
All reports will be acknowledged within 24 hours and fully resolved within 30 business days