How Does Cado Security Keep Your Data Safe?
At Cado Security, we prioritize security throughout the entire development process, from the initial idea to the final product. Every aspect is built with robust security measures to ensure smooth operations and strong protection for your data.
For more information, contact sales@cadosecurity.com to learn more about:
- Product Security: Features such as audit logging, role-based access control (RBAC), authentication, and encryption.
- Corporate Security: Our approach to hiring checks and employee security training.
- Our Policies: Compliance with SOC2, company policies, and vendor management.
- Application Security: Practices like secure software development lifecycle (SDLC) and regular penetration testing.
Audit Logs
Audit logs are viewable via the user interface at Help > View Audit Logs and can be exported. They are also available via the API, or by forwarding to Cloudwatch or another SIEM. They are persisted on disk under /var/log.