Cloudly Security
Cloudly is built with security-first controls across infrastructure, application access, and operational processes. The controls below summarise how we protect customer data and keep service environments resilient.
1. Encryption and Data Protection
- Data is encrypted at rest using modern encryption controls.
- Data in transit is protected using secure transport protocols.
- Security controls are applied to recordings, transcripts, and metadata layers.
2. Identity, Access, and Authentication
- Role-based access control with least-privilege assignment.
- Administrative workflows are protected by strong authentication controls.
- Access paths are logged, reviewable, and periodically audited.
3. Monitoring, Detection, and Response
- Infrastructure and service health are continuously monitored.
- Security-relevant events are captured for triage and investigation.
- Incident workflows are documented, tested, and continuously improved.
4. Vulnerability and Change Management
- Patch and remediation cycles are maintained across critical systems.
- Security hardening is applied to platform and network layers.
- Configuration and release changes are controlled through formal processes.
5. Business Continuity
- Backup and recovery controls are maintained for critical workloads.
- Operational resilience procedures are documented and reviewed.
- Recovery priorities are aligned to customer service continuity needs.
6. Security Enquiries
For security due diligence or questionnaire requests, contact hello@cloudly.com.au.
