Skip to main content

Security Overview

Security is a foundational pillar of the Zild platform. We design, build, and operate our infrastructure following modern security-by-design principles to ensure confidentiality, integrity, and availability of customer data.

Our Security Principles

  • Least Privilege Access — Users and systems receive only the minimum permissions required.
  • Defense in Depth — Multiple security layers protect infrastructure, applications, and data.
  • Zero Trust Architecture — All requests are authenticated and authorized.
  • Secure Development Lifecycle (SDLC) — Security reviews are embedded into our engineering workflow.

Infrastructure Security

Zild is hosted in secure cloud environments with:
  • Network isolation (VPC segmentation)
  • Firewall and WAF protection
  • DDoS mitigation
  • Continuous monitoring and alerting

Application Security

  • Secure authentication (JWT / OAuth where applicable)
  • Role-based access control (RBAC)
  • Rate limiting and abuse protection
  • Continuous vulnerability scanning

Operational Security

  • Strict access control to production environments
  • Multi-factor authentication (MFA)
  • Audit logs and traceability
  • Periodic internal security reviews
If you require additional security documentation (e.g., architecture diagrams or security questionnaire responses), contact support@zild.ai.