Our Commitment to Security
At Corporate, security is the foundation of everything we do.
We understand that our customers entrust us with their most business-critical data and processes. We take that responsibility very seriously.
Our security program is designed to protect our customers, our platform, and our infrastructure from today's and tomorrow's threats.
This page provides an overview of the principles and practices that make up our security strategy.
Our Commitment
We believe the internet should be accessible to all. Our goal is to comply with the internationally recognized Web Content Accessibility Guidelines (WCAG) 2.1 at the AA level. These guidelines explain how to make web content more accessible for people with a wide range of disabilities, including visual, auditory, cognitive, and motor impairments.
Our Security Philosophy
Our approach to security is built on three core principles:
-
Security by Design
We build security into every phase of our development lifecycle, from the initial idea to the final code. It is not an afterthought; it is an integral part of our process. -
Proactive Defense
We don't wait for a problem to occur.
We work proactively with continuous monitoring, regular penetration testing, and close collaboration with the security community to identify and patch potential vulnerabilities before they can be exploited. -
Transparency
We believe in openness.
When security incidents occur, our commitment is to communicate clearly and honestly with our customers and partners.
How We Protect Your Data
We employ a multi-layered strategy to protect the data processed through our systems.
Application Security
Security starts in our product.
The Corporate Framework is developed in accordance with industry standards like the OWASP Top 10 to provide built-in protection against the most common web vulnerabilities.
Infrastructure & Network Security
All of our production systems are hosted with leading, top-tier cloud providers who comply with the strictest international security standards.
-
Network Isolation
Our infrastructure is protected by firewalls, and network access is strictly limited. -
DDoS Protection
We use advanced solutions to protect against Denial of Service attacks. -
Intrusion Detection
Our systems are continuously monitored for suspicious activity and potential intrusion attempts.
Data Encryption
We ensure your data is protected, both when it is stored and when it is transferred.
-
Encryption in Transit
All data communication to and from our platform is encrypted with TLS 1.3. -
Encryption at Rest
All customer data stored in our databases and file storage is encrypted with strong, industry-approved algorithms like AES-256.
Access Control & Internal Policies
We enforce strict internal access policies to protect against unauthorized access.
-
Principle of Least Privilege
Our employees only have access to the systems and data that are absolutely necessary to perform their jobs. -
Mandatory MFA
All employees are required to use Multi-Factor Authentication to access sensitive internal systems. -
Background Checks
All employees undergo a background check as part of the hiring process.
Reporting a Security Vulnerability
We recognize the critical role that the security community plays in helping us maintain a secure platform.
If you believe you have discovered a security vulnerability in our framework or one of our systems, we encourage you to report it to us responsibly.
How to Report
-
Primary Contact
Please send a detailed report of your findings to security@corporate.net. -
Encrypted Communication
To submit your report securely, we encourage you to use our PGP key for encrypted communication.
Download our PGP Key here. -
Preferred Languages
We accept vulnerability reports written in the following languages: English, Danish, Norwegian, Swedish, German, French, and Arabic.
Our Commitment
- We will investigate all reports in a timely manner.
- We will not take legal action against you, provided you act in good faith and adhere to our responsible disclosure policy.
- We publicly recognize the contributions of researchers on our Acknowledgments page (Hall of Fame).
We encourage professional researchers to apply to our official Security Partner Program.
Interested in joining our team?
We are always looking for talented security professionals.
Check out our open positions on our Careers page.