Security isn't something we consult on — it's how we operate. This page describes the security practices we follow for our own infrastructure, your data, and our engagements.
| Control | Implementation |
|---|---|
| Hosting | Cloudflare Pages with DDoS protection, WAF, and bot management |
| DNS | Cloudflare DNS with DNSSEC, proxy-enabled |
| TLS | TLS 1.3 minimum, HSTS enabled, certificate pinning via Cloudflare |
| Zero Trust | Cloudflare Zero Trust (Access + Gateway) for all internal tools |
| Identity | Authentik SSO with MFA enforced for all team members |
| Secrets | Infisical for secrets management, no secrets in code or environment files |
| Tunnels | Cloudflare Tunnels for all internal service exposure — no open inbound ports |
All data transmitted between your browser and our services is encrypted with TLS 1.3. Internal service-to-service communication uses mutual TLS or encrypted tunnels.
We minimize data storage. What we do store — engagement records, contact submissions — is encrypted at rest using AES-256 via our infrastructure providers.
We follow least-privilege access. Every internal tool requires SSO authentication with MFA. Access is role-based and reviewed quarterly. No standing admin access — elevated permissions are time-bound and audited.
When we access your infrastructure during an engagement:
If we discover a security incident affecting our infrastructure or your data:
If you discover a vulnerability in our systems, we want to hear about it. Send details to security@quandrylabs.com. We ask that you:
We acknowledge reports within 48 hours and aim to triage within 5 business days.
| Framework | Status |
|---|---|
| SOC 2 Type II | Planned — Q4 2026 |
| GDPR | Compliant — see Privacy Policy and DPA |
| CCPA | Compliant — see Privacy Policy |
| ISO 27001 | Planned — 2027 |
For security inquiries or to report a vulnerability:
Quandry Labs, Inc.
Email: security@quandrylabs.com
Attn: Security
United States