• Products
  • Solutions
  • Company
  • Resources
  • Docs
  • Pricing

Security Information

Kili Technology’s security practices are multidimensional and reflect the different ways in which Kili Technology interacts with its customers

Corporate governance

  • Human Resources: personnel are made aware of security

  • Information and asset classification: information and assets are classified according degree of confidentiality

  • Incident Management: Kili Technology respond to events that create suspicions of unauthorized data access or processing

  • Risk management resiliency program: Kili Technology has a business continuity and disaster recovery plan

Kili’s information security practices

  • Access control: policies and procedures are in place to govern access to and use of data and resources

  • Network communications security: Kili has guidelines to manage network security

  • Data Security: Kili has guidelines designed to protect the confidentiality, integrity and availability of data

  • Laptops: anti-malware, updates and encryption are required

  • Physical and environmental: controls protect Kili assets, personnel and infrastructure

  • Communications and operations management: role-based access are in place

  • Supply chain security: supply chain risk is monitored

Secure Development

  • Programming Standards: Roadmap, training and guidance for developers are in place to produce secure code

  • Security analysis and testing: testing is performed, including functional, static and dynamic analysis

  • Ethical hacking: operational security analysis and penetration testing are run on a regular basis

  • Secure configuration: Kili Technology products and services must be secure by default