Security at Celestra

We take the security of your data seriously. Our security program is designed to protect your information and maintain your trust.

Compliance & Certifications

SOC 2 Type IIAligned
HIPAAAligned

Security Practices

Data Encryption

All data is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption. Database backups and sensitive credentials are encrypted with industry-standard protocols.

Infrastructure Security

Our infrastructure is hosted on SOC 2 compliant cloud providers with enterprise-grade physical security, redundancy, and 24/7 monitoring. We use network segmentation and firewalls to isolate systems.

Access Control

We enforce the principle of least privilege. All employees use SSO with multi-factor authentication. Access to production systems is logged, reviewed regularly, and restricted to authorized personnel only.

Secure Development

We follow secure coding practices including code reviews, static analysis, and dependency scanning. All changes go through version control and require approval before deployment.

Incident Response

We maintain an incident response plan with defined roles, communication procedures, and post-incident reviews. Security events are monitored and alerts are triaged 24/7.

Vendor Management

Third-party vendors are evaluated for security practices before engagement. We maintain a vendor inventory and review critical vendors annually for continued compliance.

Reporting Security Issues

If you believe you have discovered a security vulnerability in our systems, please report it to us responsibly. We appreciate your help in keeping Celestra secure.

Contact us at: hello@celestra.com

Questions about our security?

We are happy to provide additional documentation upon request.

Contact Us