Kelet
Security & Compliance

Every failure, captured.
Every control, in place.

Transparent, up-to-date information about our security practices, certifications, and data protection policies.

Certifications & frameworks

Compliance

Security frameworks and certifications Kelet adheres to.

SOC 2 Type II
SOC 2 Type II
GDPR
GDPR
CCPA
CCPA
HIPAA
HIPAA

Security posture

Built secure from day one.

Kelet operates production AI agents. We hold ourselves to the same reliability standard we help others achieve.

Data Security
Encryption everywhere
AES-256 at rest. TLS 1.2+ in transit. Keys managed under strict access controls. Firewalls reviewed and approved on a regular schedule.
Access Management
Least privilege, always
RBAC with MFA on all privileged accounts. Access only after documented manager approval. User access reviewed on a regular schedule.
Availability
99.9% uptime SLA
Multi-AZ deployments. Continuous production monitoring. Backups tested regularly. Disaster recovery and incident response plans tested annually.
Compliance
SOC 2 Type II certified
Controls continuously managed. Annual third-party penetration testing. Quarterly vulnerability scans. SDLC training for all engineers.

Common questions

FAQ

Answers to what security-conscious teams ask before signing.

Yes. Email [email protected] with your company name and the context of your request. Reports are shared under NDA.
Yes. We execute DPAs as part of enterprise agreements for teams that process personal data under GDPR or CCPA. Reach out to [email protected] to start the process.
No. Your traces, signals, and data are processed solely to provide the Kelet service to your team. We do not use customer data for model training, advertising, or any other purpose.
Data is stored in SOC 2-audited cloud infrastructure on AWS. All data is encrypted at rest (AES-256) and in transit (TLS 1.2+). For region-specific requirements, contact [email protected].
Email [email protected] with a description of the issue. We respond within 24 hours and follow responsible disclosure practices. We do not pursue legal action against good-faith researchers.
For any security inquiries — reports, requests, or enterprise security reviews — email [email protected].

Documentation

Resources

Key security documents available on request.

Privacy Policy
How we collect, use, and protect your data.
View policy
SOC 2 Type II Report
Full audit report from our independent auditor.
Request access
Data Processing Agreement
DPA for GDPR/CCPA compliance, available on enterprise plans.
Request DPA
No controls found
Try a different search term.

Third-party services

Subprocessors

Services that may process data on behalf of Kelet.