Skip to content

Secure by Design

At kis.ai, our “Secure by Design” philosophy ensures our platform’s robustness and reliability through several core principles designed to provide maximum security at every level. Here’s a detailed look at each principle:

1. Zero Trust

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters. Every service within kis.ai must identify itself using certificates, ensuring that each entity is authenticated and authorized. Additionally, all traffic between services is encrypted, which protects data in transit from interception and tampering. This approach significantly reduces the risk of security breaches by ensuring that trust is established through continuous verification.

2. Trust No Code

In line with our philosophy to trust no code, every piece of code in the kis.ai platform undergoes rigorous validation using Static Application Security Testing (SAST) tools. These tools help identify and rectify vulnerabilities in the codebase before deployment. Furthermore, all binaries are digitally signed, ensuring the integrity and authenticity of the code. Our supply chain security is fully integrated into the platform, meaning that all third-party dependencies are thoroughly vetted. Custom code is executed in isolated sandboxes to prevent any potential security risks from affecting the broader system. External APIs and applications are designed following OWASP guidelines, ensuring they are secure and ready for penetration testing out of the box.

3. Secure Defaults

We implement secure defaults and least privilege principles to ensure that our platform remains secure by default. All authorization rules are configured to deny access unless explicitly granted. Users are given the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized actions. This approach limits the potential damage from compromised accounts or insider threats by ensuring that users and services operate with the least amount of privilege required.

4. Co-Located Policies

Our approach to policy management involves co-locating policies with the objects they protect. This means that security policies are defined and stored alongside the resources they govern, ensuring that policies are consistently applied and easily managed. This practice enhances the clarity and effectiveness of security measures, as policies are directly associated with the relevant objects.

5. Layer Isolation

To further enhance security, we isolate our data, observability, and control planes. This layer isolation ensures that each component operates within its own secure environment, minimizing the risk of cross-layer attacks. By segregating these layers, we protect critical data and maintain strict control over system operations, enhancing the overall security posture of the platform.

6. Automated Security Testing

Continuous security testing is vital for maintaining a secure platform. We implement automated security testing in production environments, running alongside red team exercises to identify and address vulnerabilities in real time. This proactive approach ensures that our security posture remains strong, adapting to new threats and vulnerabilities as they emerge.

7. Regular Updates

Staying ahead of potential security threats is crucial. We regularly monitor databases for zero-day vulnerabilities and apply security patches and updates promptly. This vigilance helps protect the platform from newly discovered vulnerabilities that could be exploited by attackers. By keeping our systems updated, we reduce the risk of security breaches and ensure that our defenses remain robust.

8. Audit and Logging

Comprehensive audit and logging are essential for maintaining accountability and transparency within the platform. We implement extensive logging of user activities and system events, providing a detailed record of actions taken. These logs are invaluable for security audits, compliance reporting, and forensic analysis in the event of a security incident. By maintaining detailed and accessible logs, we ensure that any suspicious activities can be quickly identified and investigated.

9. User Education

We believe that a well-informed user base is a critical component of a secure platform. We invest in user education, providing resources and training to help users understand security best practices and recognize potential threats. Educated users are better equipped to act securely and responsibly, reducing the risk of human error contributing to security incidents.

By adhering to these principles, kis.ai ensures that our platform remains secure, resilient, and capable of meeting the complex security requirements of modern enterprises. Our “Secure by Design” philosophy is not just a set of guidelines but a foundational approach that permeates every aspect of our platform, providing peace of mind for our users and protecting their valuable data and applications.