Skip to content
🛡️ Security

Security

Effective: 2025

Overview

Briklin follows industry best practices to protect your data. We continuously improve our controls as the product evolves.

Data protection

  • Encryption in transit with TLS 1.2+ and at rest with AES‑256.
  • Secrets and keys stored using managed secret services.
  • Data hosted in ap-south-1 (Mumbai) with network isolation.

Access control

  • Role‑based access control (RBAC) and least‑privilege access.
  • Session management with secure cookies and device revocation.

Backups & continuity

  • Automated backups with periodic restore testing.
  • Formal RPO/RTO targets will be published at launch.

Application security

  • Input validation, rate limiting, secure headers, and CSRF protection where applicable.
  • Code reviews, dependency updates, and automated scanning in CI.

Logging & audit

  • Administrative and financial actions are logged.
  • Monitoring and alerting for unusual activity.

Incident response

We investigate security events, mitigate impact, and notify affected customers as required. Report issues to hello@briklin.com.

Last updated: 2025-08-30