Security at 1.ML
Enterprise-grade security protecting your data and machine learning models.
SOC 2 Type II
Annual audit of security controls
ISO 27001
Information security management
ISO 27701
Privacy information management
CSA STAR
Cloud security assurance
Security Measures
End-to-End Encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.3). Customer-managed encryption keys available for enterprise.
Access Controls
Role-based access control (RBAC), multi-factor authentication (MFA), and SSO integration with SAML 2.0 and OIDC.
Infrastructure Security
Deployed on hardened infrastructure with network segmentation, WAF, DDoS protection, and regular vulnerability scanning.
Monitoring & Detection
24/7 security monitoring, anomaly detection, and automated threat response. Real-time alerting for suspicious activities.
Audit Logging
Comprehensive audit trails for all system activities. Immutable logs retained for compliance and forensic analysis.
Incident Response
Documented incident response plan with defined SLAs. Breach notification within 72 hours as required by regulations.
Penetration Testing
We conduct regular security assessments to identify and address vulnerabilities:
- Annual Third-Party Penetration Tests - Conducted by certified security firms
- Continuous Vulnerability Scanning - Automated daily scans of infrastructure
- Bug Bounty Program - Responsible disclosure program for security researchers
- Code Security Reviews - Static and dynamic analysis in CI/CD pipeline
Data Center Security
Physical Security
- 24/7 security personnel
- Biometric access controls
- Video surveillance
- Mantrap entry systems
Environmental Controls
- Redundant power (N+1 UPS)
- Fire suppression systems
- Climate control monitoring
- Flood detection
Report a Vulnerability
We appreciate the work of security researchers. If you discover a vulnerability, please report it responsibly.
Security Email: security@1.ml
PGP Key: Available on our security page
Response Time: Initial response within 24 hours