Security at Stralya
Security is at the core of everything we do. Learn about the measures we take to protect your sensitive data.
AES-256 Encryption
All credentials are encrypted using AES-256, the same encryption standard used by banks and government agencies worldwide.
Two-Factor Authentication
Protect your account with TOTP-based two-factor authentication. Compatible with Google Authenticator, Authy, and other authenticator apps.
Complete Audit Trails
Every action is logged with timestamps, IP addresses, and user information. Know exactly who accessed what and when.
Secure Infrastructure
Our infrastructure is hosted on enterprise-grade cloud providers with SOC 2 compliance, regular backups, and redundancy.
Data Encryption
Encryption at Rest
All stored credentials are encrypted using AES-256 encryption before being stored in our database. Encryption keys are managed using industry-standard key management practices.
Encryption in Transit
All data transmitted between your browser and our servers is encrypted using TLS 1.3, ensuring your data cannot be intercepted during transmission.
Secure Key Management
Encryption keys are stored separately from encrypted data and are regularly rotated to maintain the highest level of security.
Access Control
Role-Based Permissions
Define who can view, edit, or manage credentials with granular role-based access controls. Limit access to specific clients or teams.
Session Management
View and manage active sessions across all devices. Revoke access instantly if a device is lost or compromised.
Login Notifications
Receive email alerts when your account is accessed from a new device or location, helping you detect unauthorized access immediately.
Secure Credential Submission
Unique Secure Links
Each credential request generates a unique, cryptographically secure link that expires automatically after a set period.
No Account Required for Clients
Clients can submit credentials without creating an account, reducing friction while maintaining security through encrypted submission links.
Automatic Link Expiration
Submission links automatically expire after the configured period, ensuring credentials cannot be submitted through old links.
Infrastructure Security
Cloud Security
We use enterprise-grade cloud infrastructure with built-in DDoS protection, firewalls, and intrusion detection systems.
Regular Backups
Automated daily backups with point-in-time recovery ensure your data is protected against accidental loss or corruption.
Security Monitoring
24/7 monitoring and alerting for suspicious activities, with automated responses to potential security threats.
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it to us responsibly.
Report Security Issues
Email: [email protected]
Please include a detailed description of the vulnerability and steps to reproduce it. We commit to acknowledging your report within 48 hours.