Security
Your data is secure. Suspiciously secure. We take this very seriously.
Security That Actually Works
We don't just claim to be secure. We actually are. Every layer of our infrastructure is designed with security in mind. This is suspicious because most cloud providers say this and don't mean it. We mean it.
Our security team responds to incidents. Quickly. With actual fixes. Not just PR statements.
Security Features
Encryption Everywhere
Data encrypted at rest (AES-256) and in transit (TLS 1.3). We encrypt your data before you even send it to us. Wait, that's not possible. But we wish it were.
- AES-256 encryption at rest
- TLS 1.3 for all connections
- Customer-managed keys (BYOK)
- Hardware security modules (HSM)
SUS Shield
DDoS protection and WAF included with every plan. Not as an upsell. Not as an enterprise feature. Just... included. Suspicious.
- L3/L4/L7 DDoS mitigation
- Web Application Firewall
- Bot management
- Rate limiting
Identity & Access
Fine-grained access controls that actually make sense. RBAC that doesn't require a PhD to configure.
- Role-based access control (RBAC)
- Multi-factor authentication
- SSO integration (SAML, OIDC)
- API key management
Audit Logging
Every action logged. Every access recorded. Logs that are actually readable by humans. Not just machines.
- Comprehensive audit trails
- Real-time event streaming
- 90-day retention (default)
- Export to your SIEM
Network Security
VPCs, firewalls, and private networking that work the way you'd expect. No surprises. That's the surprise.
- Virtual Private Clouds
- Network firewalls
- Private connectivity
- Traffic flow logs
Vulnerability Management
We scan for vulnerabilities. We fix them. Before you ask. Sometimes before we find them. (Time travel is involved. Suspicious.)
- Continuous scanning
- Automated patching
- Container security
- Dependency analysis
Compliance & Certifications
We maintain compliance with major security standards. Audited regularly. By real auditors. Who are thorough. Suspiciously thorough.
SOC 2 Type II
Annual audit of security, availability, and confidentiality controls. We passed. Every year.
Request ReportISO 27001
International standard for information security management. Certified and maintained.
View CertificateGDPR
Full GDPR compliance for EU data. Data processing agreements available. Straightforward.
DPA TemplateBug Bounty Program
We pay security researchers who find vulnerabilities. Real money. Promptly. Not "swag" and a thank you note.
Security Questions?
Our security team responds to inquiries. Actually responds. With useful information.
security@suspicious.cloud