Legal

Security Policy

High-level placeholder description of controls for authentication, encryption, monitoring, and incident response.

Last updated: February 10, 2026

Security program

VIZOR, a product of VELTGAIST, follows a layered security model with technical and administrative controls across infrastructure and application surfaces.

Controls are reviewed periodically and adjusted based on threat posture and product changes.

Access control

Role-based permissions and least-privilege principles are used for internal and customer-facing access paths.

Sensitive operations are audited and protected by additional checks where applicable.

Encryption

Transport encryption is enforced for client-server communication.

Stored secrets and sensitive values use managed encryption controls at rest.

Detection and response

Operational telemetry and audit data are used to detect unusual activity and support investigations.

Incident response includes containment, remediation, and post-incident review.

Responsible disclosure

Security researchers can report vulnerabilities via the contact channel listed in `/.well-known/security.txt`.

Valid reports are triaged promptly and addressed based on severity and exploitability.