Security & Compliance
Every failure, captured.
Every control, in place.
Transparent, up-to-date information about our security practices, certifications, and data protection policies.
Certifications & frameworks
Compliance
Security frameworks and certifications Kelet adheres to.
SOC 2 Type II
GDPR
CCPA
HIPAA
Security posture
Built secure from day one.
Kelet operates production AI agents. We hold ourselves to the same reliability standard we help others achieve.
Data Security
Encryption everywhere
AES-256 at rest. TLS 1.2+ in transit. Keys managed under strict access controls. Firewalls reviewed and approved on a regular schedule.
Access Management
Least privilege, always
RBAC with MFA on all privileged accounts. Access only after documented manager approval. User access reviewed on a regular schedule.
Availability
99.9% uptime SLA
Multi-AZ deployments. Continuous production monitoring. Backups tested regularly. Disaster recovery and incident response plans tested annually.
Compliance
SOC 2 Type II certified
Controls continuously managed. Annual third-party penetration testing. Quarterly vulnerability scans. SDLC training for all engineers.
Common questions
FAQ
Answers to what security-conscious teams ask before signing.
Yes. Email [email protected] with your company name and the context of your request. Reports are shared under NDA.
Yes. We execute DPAs as part of enterprise agreements for teams that process personal data under GDPR or CCPA. Reach out to [email protected] to start the process.
No. Your traces, signals, and data are processed solely to provide the Kelet service to your team. We do not use customer data for model training, advertising, or any other purpose.
Data is stored in SOC 2-audited cloud infrastructure on AWS. All data is encrypted at rest (AES-256) and in transit (TLS 1.2+). For region-specific requirements, contact [email protected].
Email [email protected] with a description of the issue. We respond within 24 hours and follow responsible disclosure practices. We do not pursue legal action against good-faith researchers.
For any security inquiries — reports, requests, or enterprise security reviews — email [email protected].
Documentation
Resources
Key security documents available on request.
No controls found
Try a different search term.
Third-party services
Subprocessors
Services that may process data on behalf of Kelet.