Security & Compliance
Aerol is built with security at its core. We maintain comprehensive security policies aligned with industry standards to protect your code and data.
Compliance Frameworks
NIST Cybersecurity Framework
AlignedOur security controls are mapped to the NIST Cybersecurity Framework, covering Identify, Protect, Detect, Respond, and Recover functions.
GDPR
CompliantWe comply with GDPR requirements for data protection, privacy by design, data subject rights, and cross-border data transfers.
SOC 2 Type I
ReadyOur policies and procedures are designed to meet SOC 2 Trust Service Criteria. Formal audit planned for growth stage.
Technical Security Highlights
Encryption
- AES-256-GCM encryption for data at rest
- TLS 1.2+ for all data in transit
- JWE-encrypted session tokens
- OAuth tokens encrypted before storage
Authentication
- OAuth 2.0 via GitHub, GitLab, Google, Bitbucket
- Multi-factor authentication supported
- Personal access tokens with SHA-256 hashing
- Session management with secure cookies
Infrastructure
- Cloud-native deployment on GCP / Vercel
- Kubernetes orchestration with rolling updates
- Non-root Docker containers
- Comprehensive SSRF protection
Code Security
- TypeScript strict mode across all codebases
- Zod schema validation on all API inputs
- Drizzle ORM preventing SQL injection
- GitHub Actions CI/CD with automated checks
Adopted Security Policies
We maintain 25+ security policies covering all critical domains. All policies are reviewed annually and updated as needed.
Access Control
AdoptedRole-based access control, multi-factor authentication, single sign-on via OAuth providers, and regular access reviews.
Data Protection
AdoptedAES-256-GCM encryption at rest, TLS 1.2+ in transit, encryption key management, and data classification model.
Secure SDLC
AdoptedSecure software development lifecycle with code reviews, dependency scanning, static analysis, and penetration testing.
Incident Response
AdoptedDefined incident response team, escalation procedures, playbooks for common scenarios, and post-incident reviews.
Business Continuity
AdoptedDisaster recovery procedures, data backup and recovery, application service recovery, and regular BCDR testing.
Vulnerability Management
AdoptedRegular vulnerability scanning, defined remediation SLAs, and coordinated disclosure process.
Vendor Risk Management
AdoptedThird-party security assessments, contractual security requirements, and ongoing vendor monitoring.
Risk Management
AdoptedAnnual risk assessments, risk registry, mitigation tracking, and continuous monitoring of residual risks.
HR & Personnel Security
AdoptedBackground screening, security awareness training, acceptable use policies, and secure offboarding procedures.
Configuration Management
AdoptedInfrastructure as code, change management processes, patch management, and production deploy controls.
Privacy & Consent
AdoptedPublished privacy policy, GDPR data processing agreements, data subject rights procedures, and cookie policy.
System Auditing
AdoptedSecurity event logging, audit trail integrity, internal audits, and monitoring of system activities.
Vulnerability Disclosure
Aerol takes security seriously. If you believe you have discovered a security vulnerability, please report it responsibly.
Report a Vulnerability
Email: security@aerol.ai
What to Include in Your Report
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any supporting screenshots or logs
We will acknowledge receipt within 48 hours and work to address verified issues promptly. We ask that you allow us reasonable time to resolve the issue before public disclosure.
Data Handling
Aerol processes developer source code and repository metadata to provide AI-powered code analysis and documentation. We follow strict data handling procedures:
- Code is processed in isolated, ephemeral environments and not retained beyond the analysis session
- Your code is never used to train AI models
- All data is classified according to our four-tier model: Critical, Confidential, Internal, and Public
- Data deletion requests are honored promptly per our data retention policy