Skip to main content
Security

Security Is Not a Feature.
It's the Foundation.

Founded by a security professional with deep enterprise experience. Data protection, access control, and operational security are embedded in every layer of how we operate.

AES-256 / TLS 1.3 Encryption Standard
High-availability design Availability
Client-defined Data Retention
< 24h notification Incident Response
Comprehensive Access Logging
Quarterly Key Rotation
Architecture

Six Pillars of Protection

Every engagement is governed by a security architecture designed for enterprise-grade requirements.

Encryption

AES-256 at rest, TLS 1.3 in transit. Zero-trust architecture.

Access Control

RBAC with least privilege. MFA mandatory, no exceptions.

Infrastructure

Hardened cloud architecture with network segmentation.

Monitoring

Centralized logging with anomaly detection and alerting.

Compliance

SOC 2 Type I in progress. NIST 800-53 aligned.

Incident Response

Documented IR plan with defined SLAs and client notification.

Compliance

SOC 2 Compliance Roadmap

Our path to SOC 2 Type II certification with transparent milestones.

Q1 2026

Security Foundation

NIST 800-53 control mapping and gap analysis completed.

Q2 2026

SOC 2 Type I

Assessor selection and formal audit engagement.

Q3 2026

Penetration Testing

Annual third-party penetration test and remediation cycle.

Q4 2026

SOC 2 Type II

Observation period begins for Type II certification.

Q1 2027

Type II Certification

Targeted SOC 2 Type II report issuance.

Responsible Disclosure

We value the security research community. If you discover a vulnerability in our systems, we encourage responsible disclosure. We commit to:

  • Acknowledging your report within 48 hours
  • Providing a timeline for remediation
  • Recognizing your contribution (with your permission)
  • No legal action against good-faith researchers
security@jinki.ai

Please include detailed steps to reproduce the issue and allow reasonable time for remediation before public disclosure.

Need Our Security Documentation?

We provide detailed security architecture documentation, compliance attestations, and data handling procedures under NDA.

Request Security Review