Security @ SPIRL

At SPIRL, we prioritize security by adopting best-in-class practices that form the backbone of our comprehensive security framework. Our mission is to continuously enhance our security posture, enabling us to deliver top-notch protection for our customers.

  • Hardware-Backed Security Keys

    We employ hardware-backed security keys throughout our organization, including for all SPIRL team members, to ensure robust two-factor authentication across our infrastructure.

  • Keyless and Secretless Access

    Protecting and managing static secrets can be challenging. At SPIRL, we strive for secretless and keyless authentication by using SPIFFE-based workload identities and federation to assign temporary, secure credentials.

  • Rigorous Code Audits

    All code undergoes a thorough review process before it is merged, ensuring that our systems remain secure and reliable.

  • Continuous Threat Monitoring

    SPIRL uses advanced monitoring techniques to detect and respond to any unusual activity in our infrastructure and application access.

  • Real-Time Production Alerts

    We stay ahead of potential risks by monitoring and alerting our team whenever critical changes are made to our production environment.

  • Responsible Disclosure

    At SPIRL, we are deeply committed to maintaining the highest levels of security. If you identify any security vulnerabilities within our systems, simply email our security team at security@spirl.com with details of the issue and any supporting information you have.