Security & Trust

Our commitment to data protection and trust

We publish how we handle and protect your data.

Security Controls

Transport Encryption

All communications are encrypted with TLS 1.2 or higher. HTTP redirects to HTTPS.

Encryption at Rest

Database and object storage use AES-256 provider-level encryption at rest.

Credential Protection

For Enterprise authenticated scanning, the browser extension performs AES-GCM 256-bit encryption client-side before transmitting session cookies to STLUR servers. Encryption keys use a two-layer architecture (HKDF-derived from an installation token), so a storage breach alone cannot decrypt credentials. Plaintext credentials exist only in memory during scan execution and are discarded immediately after.

Access Control

Row-Level Security (RLS) ensures each user accesses only their own data. Admin interfaces are MFA-protected private endpoints.

Vulnerability Management

STLUR runs automated monthly ZAP/Nuclei scans on its own infrastructure and remediates critical findings within 30 days.

SOC 2 Roadmap

We are currently preparing for SOC 2 Type I. STLUR reports assist with SOC 2 TSC evidence collection; they are not STLUR's own SOC 2 opinion letter. We will publish it upon certification.

SOC 2 Trust Services Criteria Coverage

STLUR reports automate evidence collection for the following TSC items. STLUR itself does not issue a SOC 2 opinion letter.

TSCCriteriaStatus
CC6.1Logical Access ControlCovered
CC6.6Vulnerability ManagementCovered
CC6.7Transmission SecurityCovered
CC4.1Continuous MonitoringPartial
A1.2Availability MonitoringPartial
CC1–CC9Full COSO Criteria (Type II)Planned

Data Residency

Customer data is primarily processed and stored in the US (database & authentication) and the Asia-Pacific region (security scan execution). Edge cache may temporarily hold data across the global network. Scan results (vulnerability data) are stored encrypted with AES-256 in object storage.

Sub-processors

Third-party service providers STLUR uses for data processing.

Provider TypePurposeLocation
Database & Authentication ProviderCustomer data storage & user authenticationUS
Edge Network & Storage ProviderCDN, edge compute, object storage & DNSGlobal
Frontend Hosting ProviderWeb application hosting & deliveryGlobal
Cloud Computing ProviderSecurity scanner execution (isolated containers)Asia-Pacific
Payment Processing ProviderPayment processing & billingUS / EU
AI Processing ProviderReport summary generation (text only, no customer PII)US
Email Delivery ProviderTransactional email deliveryUS

Backup & Availability

Data Backup

The database performs daily automated backups with up to 7-day point-in-time recovery (PITR).

Scan Data Retention

Scan results are retained for at least 13 months (used for year-over-year delta).

Status Page

A public status page is in preparation. It will be linked here once available.

Data Processing Agreement (DPA)

We provide a Data Processing Agreement (DPA) compliant with GDPR, CCPA, and APPI upon request. Submit the form below or contact security@stlur.app directly. We typically respond within 2 business days.

Request a DPA

Please send the following information to security@stlur.app: Company name, contact person, email address, applicable jurisdiction (EU / US / JP etc.), and intended use case.

Request a DPA

Security Vulnerability Disclosure

If you discover a vulnerability in STLUR's services, please report it to security@stlur.com. We follow responsible disclosure and aim to respond within 90 days of receipt.

Last updated: 2026-04-17