Security at Cashmere
At Cashmere AI, we take security very seriously. We implement robust security measures to ensure the protection and integrity of your data. For detailed information, please reach out to our team or visit our Trust Center.
Encryption and Key Management
We use strong encryption algorithms to protect data-in-transit and data-at-rest. Our key management policies ensure secure generation, storage, and rotation of encryption keys.
Information Security Policy
We enforce strict security policies including background checks, confidentiality agreements, ongoing security training, and secure coding practices for all personnel.
Physical and System Security
Our measures include clear desk and screen policies, secure remote work practices, controlled system access, and regular account audits.
Asset and Data Management
We protect our assets and data through rigorous configuration and asset management, secure data handling, thorough change management, and proactive vulnerability management.
Business Continuity and Incident Response
We maintain business continuity plans, regular backups, detailed incident response procedures, and conduct annual risk assessments to ensure uninterrupted operations.
Vendor and Privacy Management
We conduct security assessments for third-party services and strictly manage personal data to ensure privacy and compliance with regulations.
Enforcement and Exceptions
Policy violations result in disciplinary action, and exceptions to our policies are carefully evaluated and approved by management.
SOC 2 Type 1 Compliant
Security Commitment
SOC 2 Type 1 Compliant
Cashmere maintains compliance with rigorous industry-accepted information security certification.