Security First

Security Protocols

SYML | Ai is built with a security-first architecture and operational controls designed to align with SOC 2 Trust Services Criteria for Security, Availability, and Confidentiality.

Compliance Status

While we have not yet completed a formal third-party SOC 2 attestation, our architecture and operating practices are designed to be SOC 2-aligned and audit-ready. We are actively working toward formal certification as part of our commitment to enterprise-grade security.

Security Principles

Least Privilege by Default

Access is restricted to the minimum permissions required for each role and function, reducing the potential impact of compromised credentials.

Defense in Depth

Multiple layers of security controls protect data, identity, and application traffic, ensuring no single point of failure.

Continuous Visibility

Comprehensive logging, monitoring, and alerting capabilities enable rapid detection and response to security events.

Secure by Design

Infrastructure and changes are managed through repeatable, reviewable automation using Infrastructure as Code (IaC) practices.

Identity & Access Management

We implement robust access controls to minimize the risk of unauthorized access to systems and data.

Root account protected with hardware-based multi-factor authentication (MFA)
Role-based access control (RBAC) with tightly scoped permissions
Elimination of long-lived credentials where operationally feasible
Segregation of duties enforced through role assignments and environment boundaries

Logging, Monitoring & Auditability

We maintain comprehensive audit trails and continuous security monitoring to ensure accountability and rapid incident detection.

Centralized audit logging for all account and API activity
Continuous configuration recording to track infrastructure changes over time
Automated threat detection to identify suspicious activity and potential compromises
Security posture assessment against industry best-practice benchmarks
Real-time alerting for high-severity security findings

Data Protection

We implement comprehensive data protection measures throughout the entire data lifecycle.

TLS encryption for all data in transit across supported endpoints
AES-256 encryption at rest using customer-managed encryption keys where applicable
Secrets stored in managed secret storage services (no secrets committed to code repositories)
Access controls and audit logging for all sensitive configuration and secrets

Network & Edge Protection

We protect application traffic at the network edge and minimize attack surface through multiple defensive layers.

Web Application Firewall (WAF) protection against OWASP Top 10 and common web threats
Rate limiting to mitigate abuse and automated attack attempts
Geographic access restrictions based on organizational security policies

DDoS Protection

Our platform employs multiple layers of edge and network protections. Google Cloud Armor provides enterprise-grade DDoS mitigation and WAF protection, integrated with our Cloud Load Balancing infrastructure.

Business Continuity & Recovery

We implement backup and recovery procedures to ensure data integrity and service availability.

Automated backups enabled for critical data stores and configurations
Recovery procedures designed to support timely restoration of service and data integrity

Incident Response

We maintain incident response capabilities designed to support timely detection, containment, and remediation of security events.

Security event triage using centralized findings and alerting systems
Comprehensive audit logs maintained to support investigation and corrective actions
Incident response documentation being formalized as the platform matures

Security Testing & Change Management

We employ structured change management practices to maintain security and reduce configuration drift.

Infrastructure as Code (IaC) for consistent and auditable cloud resource provisioning
Controlled deployment processes to minimize configuration drift
Ongoing review of security signals and findings as part of regular operations

Responsible Disclosure

If you believe you have discovered a security vulnerability, we encourage responsible disclosure. Please contact our security team with details so we can investigate and address the issue promptly.

security@syml.ai

Last Updated: January 2026