Book a Demo

Home / Trust / Security

Security at Appice

Appice is deployed at over 10 Tier-1 banks, healthcare networks, and government agencies. The security posture below is what made that possible — and what we audit ourselves against every quarter.

Encryption

In transit

All data in motion is encrypted with TLS 1.2 or higher. TLS 1.0 and 1.1 are disabled at the load balancer. Cipher suites follow the Mozilla "intermediate" profile. HSTS is enforced with a 1-year max-age and preload.

At rest

All persistent storage — application databases, object storage, backups, log archives — is encrypted with AES-256. Keys are managed by the cloud provider's KMS (AWS KMS in India and EU regions; Azure Key Vault in GCC) with annual rotation and per-environment separation.

Application-layer

HashID — Appice's anonymous identifier for cross-property reach — is hashed with SHA-256 + per-tenant salt before persistence. Raw email and phone numbers are never stored unencrypted.

Network controls

Identity and access management

Customer-facing

Internal

Secure development lifecycle

Vulnerability management

SeverityPatch SLASource
Critical24 hoursCVE feed, dependency scan, pen-test, bug bounty
High7 daysSame
Medium30 daysSame
LowNext quarterly cycleSame

External penetration testing performed annually by an independent CREST-certified firm. Summary report available under NDA. Bug bounty program runs continuously — see security@appice.ai.

Incident response

24/7 on-call rotation across infra, application, and security teams. Incidents are classified P0 through P4 with documented response targets:

SeverityAcknowledgementCustomer notification
P0 — Confirmed breach affecting customer data15 minWithin 4 hours; regulator notification per jurisdiction (GDPR: 72 hours)
P1 — Critical service outage15 minStatus page within 30 min; updates every hour
P2 — Degraded service30 minStatus page within 1 hour
P3 — Limited impact4 hoursStatus page if customer-visible

Post-incident reviews are written for every P0/P1 and shared with affected customers. Lessons feed back into the security control set and runbooks.

Reporting a vulnerability? Email security@appice.ai. Encrypt sensitive details with our PGP key (fingerprint published on this page on request). We acknowledge within 24 hours.

Related