Security at Vultrik

Last Updated: November 1, 2025

Security First: At Vultrik, security isn't just what we scan for—it's how we build. We implement the same security practices we recommend to our customers, ensuring your data is protected at every level.

Our Security Commitment

As a security scanning platform, we hold ourselves to the highest standards. We understand that you're trusting us with sensitive information about your infrastructure, and we take that responsibility seriously.

Core Security Principles

Platform Security

Authentication

  • Bcrypt password hashing (10 salt rounds)
  • JWT session tokens (7-day expiration)
  • TOTP-based two-factor authentication
  • Google OAuth integration
  • Rate limiting on login attempts

Data Protection

  • HTTPS/TLS encryption in transit
  • Encrypted data at rest
  • Parameterized database queries
  • SQL injection prevention
  • Regular security backups

API Security

  • SHA-256 hashed API keys
  • Scoped permissions
  • Rate limiting per key
  • IP whitelisting available
  • Usage monitoring and alerts

Access Control

  • Role-based access control (RBAC)
  • User isolation and data segregation
  • Audit logs for all actions
  • Session management
  • Automatic session timeout

Network Security

  • Web Application Firewall (WAF)
  • DDoS protection
  • Content Security Policy (CSP)
  • Security headers (HSTS, X-Frame-Options)
  • Regular vulnerability scanning

Monitoring

  • 24/7 security monitoring
  • Intrusion detection systems
  • Real-time threat intelligence
  • Automated security alerts
  • Incident response procedures

Data Privacy

We're committed to protecting your privacy and handling your data responsibly:

What We Do

Read our complete Privacy Policy for detailed information.

Infrastructure Security

Our infrastructure is built on industry-leading cloud providers with robust security:

Compliance & Certifications

We maintain compliance with industry standards and regulations:

GDPR

Full compliance with the EU General Data Protection Regulation for data privacy and user rights.

OWASP

Our scanning follows OWASP guidelines, and we secure our platform against the OWASP Top 10.

ISO 27001

Following information security management best practices (certification in progress).

SOC 2

Enterprise customers can request SOC 2 compliance documentation.

Security Practices

Development Security

Incident Response

Responsible Disclosure

Report a Security Vulnerability

We welcome security researchers and users to report potential vulnerabilities:

Please do not: Publicly disclose vulnerabilities before we've had time to address them.

Security Best Practices for Users

Help us keep your account secure by following these recommendations:

Protect Your Account

Third-Party Security

We carefully vet all third-party services we use:

Continuous Improvement

Security is an ongoing commitment. We continuously improve our security posture through:

Questions About Security?

We're transparent about our security practices. If you have questions or concerns:

For more information, see our Privacy Policy and Terms of Service.