Security at Celeste
We take the security of your data seriously. Here's how we protect it.
Certifications
ISO 27001
Information Security Management System — Certification in progress
SOC 2 Type II
Service Organization Controls — Certification in progress
How We Protect Your Data
Data Encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.2+). Database encryption with AWS KMS managed keys.
Access Control
Role-based access control (RBAC) with least-privilege principles. Multi-factor authentication for all internal systems.
Infrastructure
Hosted on AWS with SOC 2 compliant infrastructure. Multi-region deployment with automated failover.
Data Privacy
GDPR-aware data handling. No data sold to third parties. Data processing agreements available on request.
Monitoring
24/7 automated security monitoring. Intrusion detection, anomaly alerts, and audit logging on all systems.
Incident Response
Documented incident response procedures. Security incidents investigated within 24 hours. Transparent communication with affected customers.
Have security questions?
Contact our security team at security@withceleste.com
For responsible disclosure of vulnerabilities, email security@withceleste.com
