Security

Cybersecurity Policy

Last updated: January 2025

At Blackowl Labs LLC, security is fundamental to everything we do. This Cybersecurity Policy establishes guidelines and requirements for protecting our information assets, systems, and data. We are committed to maintaining the highest standards of security to protect our users and their financial information.

1. Compliance Framework

Our security program is built on industry-recognized frameworks and best practices:

  • ISO 27001: Information security management system standards
  • SOC 2 Type II: Service organization controls for security, availability, and confidentiality
  • Financial Industry Standards: Controls aligned with financial services regulatory requirements
  • NIST Cybersecurity Framework: Risk management and security best practices

We undergo regular third-party audits and assessments to validate our security controls and maintain compliance.

2. Data Protection

Data Classification

We classify data into four levels based on sensitivity:

  • Restricted: Highly sensitive data requiring maximum protection
  • Confidential: Sensitive business and customer data
  • Internal: Internal business information
  • Public: Information approved for public disclosure

Encryption Standards

  • In Transit: TLS 1.2 or higher for all network communications
  • At Rest: AES-256 encryption with keys managed through Google Cloud Key Management Service
  • Database: Transparent data encryption for all database storage

3. Access Controls

We implement strict access control measures following the principle of least privilege:

  • Role-Based Access Control (RBAC): Access granted based on job function
  • Multi-Factor Authentication: Required for all administrative and privileged access
  • API Key Management: Keys stored in secure vault and rotated at least quarterly
  • Session Management: Automatic timeout and secure session handling
  • Access Reviews: Quarterly reviews of all access permissions

4. Infrastructure Security

Our infrastructure is hosted on enterprise-grade cloud platforms with comprehensive security controls:

  • Network Segmentation: Isolated network zones for different system components
  • Hardened Images: Security-hardened base images for all deployments
  • Regular Updates: Automated security patching and updates
  • DDoS Protection: Enterprise-grade DDoS mitigation
  • Web Application Firewall: Protection against common web attacks

5. Vulnerability Management

We maintain a robust vulnerability management program:

  • Automated Scanning: Weekly vulnerability scans of all systems
  • Penetration Testing: Annual third-party penetration tests
  • Critical Patches: Critical vulnerabilities patched within 48 hours
  • High Severity: High-severity issues addressed within 7 days
  • Dependency Monitoring: Continuous monitoring of third-party dependencies

6. Incident Response

We maintain formal incident response procedures covering all phases:

  1. Identification: Detection and initial assessment of security events
  2. Containment: Immediate actions to limit impact and prevent spread
  3. Eradication: Removal of threat actors and malicious artifacts
  4. Recovery: Restoration of systems and services to normal operations
  5. Lessons Learned: Post-incident analysis and improvement implementation

We have defined escalation paths and notification procedures for security incidents, including regulatory notification requirements where applicable.

7. Business Continuity

We maintain comprehensive business continuity and disaster recovery capabilities:

  • Daily Backups: Automated backups with multi-region replication
  • Recovery Point Objective (RPO): Less than 1 hour of data loss
  • Recovery Time Objective (RTO): Service restoration within 2 hours
  • DR Testing: Quarterly disaster recovery drills
  • Geographic Redundancy: Multi-region infrastructure deployment

8. Secure Development

We follow secure software development lifecycle (SDLC) practices:

  • Security by Design: Security requirements integrated from project inception
  • Code Reviews: Mandatory peer review for all code changes
  • Static Analysis: Automated security scanning in CI/CD pipeline
  • Dependency Scanning: Automated checks for vulnerable dependencies
  • Security Testing: Security testing as part of release process

9. Employee Security

All employees and contractors are subject to security requirements:

  • Background Checks: Pre-employment screening for all staff
  • Security Training: Mandatory security awareness training on hire and annually
  • Phishing Simulations: Regular phishing awareness exercises
  • Acceptable Use Policy: Clear guidelines for system and data use
  • Offboarding: Immediate access revocation upon termination

10. Third-Party Risk Management

We maintain a rigorous third-party risk management program:

  • Vendor Assessment: Security evaluation before engagement
  • Contractual Requirements: Security obligations in all vendor contracts
  • Ongoing Monitoring: Continuous assessment of critical vendors
  • Data Processing Agreements: Formal agreements for data processors

11. Security Reporting

If you discover a security vulnerability or have security concerns, please report them responsibly. We appreciate the security research community's efforts in helping us maintain the security of our platform.

Please send security reports to: security@blackowl.finance

12. Contact Us

For questions about our security practices, please contact us at:

Blackowl Labs LLC

Security Team: security@blackowl.finance

General Support: support@blackowl.finance