Security at Reesk

Enterprise risk management requires enterprise-grade security. Here is how we protect your data and your organization.

Last updated: Mar 25, 2026

Encryption

All data is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption. Database backups are encrypted using the same standard.

Infrastructure

Reesk runs on enterprise-grade cloud infrastructure with redundant availability zones. Infrastructure access is restricted by role and requires multi-factor authentication.

Access Controls

We follow the principle of least privilege. Production access is logged, audited, and reviewed. Customer data is never accessed without explicit permission or legal obligation.

Backups & Recovery

Automated daily backups with point-in-time recovery. Backup integrity is tested regularly. Recovery procedures are documented and tested quarterly.

Compliance Posture

Reesk is designed with GDPR compliance requirements in mind. We maintain internal controls aligned with SOC 2 Type II principles and ISO 27001 best practices.

Vulnerability Management

We perform regular dependency audits, static code analysis, and penetration testing. Security patches are applied on an expedited schedule.

Compliance & Certifications

GDPR

Reesk is designed to support GDPR obligations. We act as a data processor for risk data you store, and provide Data Processing Agreement (DPA) templates for enterprise customers. Contact us to arrange a DPA.

SOC 2 Alignment

Our security controls are designed in alignment with SOC 2 Trust Service Criteria covering Security, Availability, and Confidentiality.

ISO 27001 Alignment

Our information security management practices follow ISO 27001 guidelines, including risk assessment, access management, and incident response.

Data Residency

Customer data is stored in EU-based infrastructure by default. Enterprise customers may request region-specific data residency options.

Responsible Disclosure

If you discover a potential security vulnerability in Reesk, we ask that you report it to us responsibly before public disclosure. We commit to:

  • Acknowledge your report within 48 hours.
  • Investigate and provide a status update within 7 business days.
  • Work with you to understand and resolve the issue before any public disclosure.

Report vulnerabilities to security@reesk.io. Please include a description of the vulnerability, steps to reproduce it, and your contact details.

Questions about security?

Our team is happy to answer security questions from enterprise prospects and customers.

Contact Security Team