Security
We follow practical, industry-standard controls and iterate as we grow.
Encryption
- • Daily check-ins and notes are encrypted at rest in our databases.
- • All data is encrypted in transit via HTTPS (TLS).
- • At rest encryption uses managed keys provided by our infrastructure providers.
Access controls
- • Least-privilege access to production systems.
- • Separate development vs production environments.
- • Admin actions are logged and reviewed.
Backups & resilience
- • Regular automated backups of core data stores.
- • Monitored infrastructure and basic alerting.
- • Disaster recovery testing as we scale.
Vulnerabilities
- • Dependency updates and security patches are part of routine work.
- • We triage reported issues quickly; contact security@sylure.com.
- • We’ll disclose material incidents and next steps promptly.
Questions?
Reach us at security@sylure.com. We’re happy to share more details under NDA if needed.