Skip to content
[ SECURITY · OUT LOUD ]

WE SECURE LOUDLY. VERIFY EVERYTHING.

Security is everyone's job. Here's exactly how we handle yours — infrastructure, people, and process.

LAST UPDATED · 2026-04-01

01 · CERTIFICATIONS

  • SOC 2 Type II (audited annually)
  • ISO 27001
  • GDPR-compliant (EU workspace available)
  • HIPAA-ready (under BAA for healthcare customers)
  • PCI-DSS scoped for billing endpoints only

02 · ENCRYPTION

AES-256 at rest. TLS 1.3 in transit. Keys rotated quarterly and managed with hardware-backed key management.

Backups are encrypted with separate keys and stored in a region-isolated vault with access restricted to the on-call security team.

03 · ACCESS CONTROL

SSO required for Enterprise. SCIM provisioning available.

Internally, we enforce least-privilege access with quarterly reviews. Production access requires hardware key, MFA, and a peer-approved JIT request.

04 · PII PROTECTION

PII is identified and redacted before entering our reasoning layer. You control the scrubber. Detected fields include names, phone numbers, card numbers, government IDs, and health identifiers. Redaction is non-reversible by default.

05 · INCIDENT RESPONSE

If we detect an incident, you hear about it in under 4 hours — not 4 weeks. We run quarterly tabletop exercises and annual external penetration tests.

Post-incident, you get a written postmortem with timeline, root cause, affected data, and remediation. No mystery boxes.

06 · DATA RESIDENCY

US, EU, and APAC workspaces available. Data never leaves its configured region, including backups and replicas.

07 · BUG BOUNTY

We run a responsible-disclosure program. Find a real vulnerability, tell us, get paid — up to $20,000 for critical issues.

Email security@crazycorky.com with details. PGP key on request.

08 · SUPPLY CHAIN

We vet third-party vendors annually. Subprocessor list is public and kept current at crazycorky.com/subprocessors. Material changes get 30 days' notice.

09 · REPORTING

Want to audit us? Enterprise customers can request our SOC 2 report, pen-test summaries, and architecture diagrams under NDA. Email security@crazycorky.com.

QUESTIONS? WRITE TO LEGAL@CRAZYCORKY.COM

STOP GUESSING. START KNOWING.