Security

Granular access controls, industry-leading certifications, and organizational measures make Kooltra a safe and reliable partner for financial institutions.

Governance

Our security program is built on documented policies and continuous monitoring, validated through independent third-party audits and certifications.

Our Security Principles

Least Privilege Access: We limit system access to only those with legitimate business needs, implementing role-based controls across all systems and applications.
Defense in Depth: Multiple layers of security controls protect your data, from network perimeter defenses to application-level encryption and monitoring.
Consistent Application: Security controls are applied uniformly across our entire platform, ensuring no gaps in protection regardless of where your data resides.
Continuous Improvement: We regularly assess and enhance our security posture through risk assessments, penetration testing, and control maturity evaluations.

Compliance & Certifications

SOC 2 Type II Certified Annual audits for Security and Availability

Financial Services Ready

  • AML/KYC compliance workflows built-in
  • Transaction monitoring capabilities
  • Regulatory reporting features
  • Financial data protection standards

Data Protection

Encryption at Rest

  • Isolated Salesforce Organizations for each customer
  • All production databases encrypted using AWS encryption
  • S3 buckets encrypted for file storage
  • DynamoDB tables with encryption enabled

Encryption in Transit

  • TLS 1.2+ for all web sessions
  • Secure SFTP with SSH key authentication
  • Encrypted APIs for system integrations
  • AWS Application Load Balancers managing certificates

Infrastructure Security

  • Web Application Firewall (WAF) protecting against attacks
  • Virtual Private Cloud (VPC) network isolation
  • Hardware Security Modules (HSMs) for key management
  • AWS CloudTrail for comprehensive audit logging

Security Operations

Continuous Monitoring

Real-Time Threat Detection

  • SIEM monitoring production infrastructure 24/7
  • Automated alerts for security anomalies
  • CloudTrail logging all AWS account activity
  • VPC traffic logs retained for one year minimum

Vulnerability Management

  • Automated scanning in CI/CD pipeline
  • Container scanning on every deployment
  • Dependency vulnerability monitoring
  • Security patches tracked and prioritized

Change Management

Secure Development Lifecycle

  • All code changes require peer review and approval
  • Automated security testing before production
  • Separate development, testing, and production environments
  • Integration testing includes vulnerability scanning
  • Deployment notifications to engineering team

Incident Response

Structured Response Program

  • Documented incident response procedures
  • Bi-weekly security team meetings
  • Root cause analysis for all incidents
  • Annual tabletop exercises
  • Disaster recovery plan with tested procedures

Access Controls

Identity Management

Google Workspace SSO Integration

  • Multi-factor authentication enforced
  • Centralized user provisioning
  • Automated deprovisioning on termination
  • Annual access reviews

Privileged Access

  • Administrative access restricted to authorized personnel
  • CI/CD system access limited to engineering team
  • Production access requires MFA

User Access Management

  • Documented access request procedures
  • Management approval required for new access
  • Automated reconciliation of user accounts
  • Access removal tickets tracked for terminations

Vendor Management

Risk-Based Approach

We classify vendors based on:

  • Data access levels
  • System integration depth
  • Business criticality

Security Assessments

  • High-risk vendors require security documentation
  • Annual reviews of critical service providers
  • SOC 2 reports collected where available
  • Security questionnaires for vendors without audits

Employee Security

Onboarding Standards

  • Background checks for all positions
  • Signed employment agreements with confidentiality clauses
  • Code of Conduct acknowledgment required
  • Information security policy acceptance

Ongoing Security Practices

  • Annual security awareness training
  • Endpoint protection on all devices
  • Disk encryption mandatory
  • Anti-malware software deployed
  • Performance reviews address security responsibilities

Business Continuity

High Availability Architecture

  • Load balancers distributing traffic
  • Auto-scaling groups for demand management
  • Multi-availability zone deployments
  • 24/7 service availability commitment

Data Resilience

  • Daily database backups
  • Point-in-time recovery (35 days)
  • Cross-availability zone replication
  • Annual disaster recovery testing

Privacy & Data Handling

Data Governance

We maintain strict controls over data handling:

  • Customer data used only for agreed services
  • No sharing with third parties except as required for service delivery
  • Data isolation between customers
  • Clear data retention and deletion procedures

Regulatory Compliance

  • Master subscription agreements defining security commitments
  • Support for customer compliance requirements
  • Strong data protection controls
  • Regular compliance framework updates