Security
Certified & Compliant
Infrastructure & Data Storage
- Isolated private cloud infrastructure
- 99.99% uptime SLA guarantee
- Multi-region backup and disaster recovery
- Geographic data residency options
- PostgreSQL with AES-256 encryption at rest
- Separate database per family (isolation)
- Automated daily backups (30-day retention)
- Point-in-time recovery capability
- Microservices architecture per family
- No shared resources between families
- Independent failure domains
- Zero cross-family data leakage
Encryption & Data Protection
- TLS 1.3 for all data in transit
- AES-256 encryption for data at rest
- End-to-end encryption for documents
- Encrypted backups with separate keys
- AWS Key Management Service (KMS)
- Automatic key rotation every 90 days
- Enterprise-grade key storage
- Separate keys per family
- Zero-knowledge architecture
- Secure document sharing
- Expiring access links
- End-to-end encrypted messaging
Access Control & Authentication
- Mandatory 2FA for all users
- Time-based one-time passwords (TOTP)
- SMS verification codes
- Authenticator app support
- Role-based access control (RBAC)
- Feature-level permissions
- Audit trail for all changes
- Custom permission groups
- Auto-timeout after 30 min inactivity
- Forced re-auth for sensitive actions
- Device management and monitoring
- IP allowlisting available
Continuous Monitoring & Auditing
- 24/7/365 intrusion detection systems
- AI-powered threat detection
- Real-time anomaly detection
- DDoS protection and mitigation
- Every action logged (user, time, IP)
- Tamper-proof audit trails
- 7-year audit log retention
- Exportable audit reports
- Quarterly penetration testing
- Continuous vulnerability scanning
- Security patches within 24 hours
- Bug bounty program
Incident Response Protocol
- Automated threat containment activated
- Security team immediately notified
- Incident classification and triage begins
- Initial forensic data collection
- Forensic analysis of breach scope
- Identification of affected systems and data
- Root cause analysis in progress
- Evidence preservation for legal purposes
- Direct notification to affected families
- Transparent incident report published
- Recommended protective actions communicated
- System restoration from clean backups
- Enhanced monitoring activated
- Detailed incident report published
- Lessons learned analysis completed
- Security improvements implemented
- Communication of preventive measures taken
Your Security Controls
- Enforce MFA for all family members
- Set password complexity requirements
- Configure session timeout policies
- Enable/disable specific features
- Real-time alerts for suspicious activity
- Login notification emails
- Download activity reports anytime
- Access logs for compliance
- Export your data anytime (GDPR right)
- Request account deletion with data wipe
- 30-day data retention after deletion
- Portable data format (JSON/CSV)
Security FAQ
You maintain full data ownership at all times. You can export your complete dataset in portable formats (JSON/CSV) anytime. In any transition scenario (acquisition, shutdown, etc.), we commit to providing 90 days advance notice and full data export capability. Your data will never be transferred without your explicit consent.
We use AES-256 encryption for data at rest and TLS 1.3 for data in transit. This is the same military-grade encryption used by banks, governments, and Fortune 500 companies. Encryption keys are managed by AWS Key Management Service (KMS) with automatic rotation every 90 days. Each family's data is encrypted with separate keys stored in secure, enterprise-grade key storage.
Only authorized users within your family. Reluna employees have zero standing access to production data. Any access required for technical support requires explicit approval, is time-limited, fully logged, and audited. We employ a "zero-trust" security model where access is granted on a just-in-time basis with the principle of least privilege.
Your data is stored in Amazon Web Services (AWS) private cloud infrastructure with geographic redundancy. We use isolated Virtual Private Clouds (VPC) with no shared resources between families. You can choose your preferred data residency region to comply with local regulations. All data is encrypted at rest using AES-256 encryption and backed up daily to multiple geographic locations.