Your data is your most valuable asset and we are committed to protecting it through enterprise-grade security across our network, product and entire organization.
Kleene’s web application operates within an Amazon Virtual Private Cloud (VPC) where HSTS ensures all communication is encrypted.
Connectivity
Safely connect your data sources and destinations with SSH tunneling, SSL/TLS, and IP whitelisting as well as HTTPS for web-based data sources.
Hosting
Kleene’s servers are hosted in Amazon Web Services, which provides compliance with industry standards including SOC 1, 2 and 3 and ISO/IEC 27001.
Security
Kleene’s Amazon Virtual Private Cloud has subnets segregated by security level and firewalls configured to restrict network access. We use automated vulnerability scans, penetration tests and third party audits to ensure optimal security.
Access Controls
We use role-based access and minimum permissions to make sure that all users can only access the data they need.
Customer Data
Kleene does not retain client data. If temporary data storage is required to execute your pipeline, Kleene can assign a designated FileZone or Object Store for the account to hold the temporary data, or you can use your own to store the temporary data.
Our Company
ISO 27001 Accredited
Our ISO certification ensures we have an information security management system (ISMS) in place that combines best practices with the controls needed for effective information security. We provide access to our ISO Certifications on request.
Policies
Our comprehensive set of policies covers everything from our software development process to our office environment. These are reviewed regularly and updated annually by our information security team to make sure they are up to date.
Passwords
We use industry-standard controls to encrypt our passwords and have strict controls to ensure that all passwords comply with our company policy.
Personnel
From onboarding to regular training, we make sure that every Kleenite understands the importance of information security and how to follow best practices in their day to day. We also use background checks in accordance with UK employment law and the specific requirements of each role.