Cloudly

Cloudly Security

Cloudly is built with security-first controls across infrastructure, application access, and operational processes. The controls below summarise how we protect customer data and keep service environments resilient.

1. Encryption and Data Protection

  • Data is encrypted at rest using modern encryption controls.
  • Data in transit is protected using secure transport protocols.
  • Security controls are applied to recordings, transcripts, and metadata layers.

2. Identity, Access, and Authentication

  • Role-based access control with least-privilege assignment.
  • Administrative workflows are protected by strong authentication controls.
  • Access paths are logged, reviewable, and periodically audited.

3. Monitoring, Detection, and Response

  • Infrastructure and service health are continuously monitored.
  • Security-relevant events are captured for triage and investigation.
  • Incident workflows are documented, tested, and continuously improved.

4. Vulnerability and Change Management

  • Patch and remediation cycles are maintained across critical systems.
  • Security hardening is applied to platform and network layers.
  • Configuration and release changes are controlled through formal processes.

5. Business Continuity

  • Backup and recovery controls are maintained for critical workloads.
  • Operational resilience procedures are documented and reviewed.
  • Recovery priorities are aligned to customer service continuity needs.

6. Security Enquiries

For security due diligence or questionnaire requests, contact hello@cloudly.com.au.