Security
How we protect your data and our infrastructure
At GoTAK LLC, security is a top priority. We implement industry-standard security practices to protect your data and ensure the reliability of the ADSBTAK service.
Infrastructure Security
Cloud Infrastructure
Hosted on enterprise-grade cloud infrastructure with built-in redundancy and DDoS protection.
Network Security
Firewalls, intrusion detection, and network monitoring protect against unauthorized access.
Regular Backups
Automated backups ensure data can be recovered in case of incidents.
99.9% Uptime SLA
High availability architecture ensures reliable service for mission-critical operations.
Data Encryption
Encryption in Transit
All data transmitted between your devices and our servers is encrypted using TLS 1.2 or higher. This includes:
- API requests and responses
- TAK Server connections (SSL/TLS with certificate authentication)
- Web dashboard access
- Webhook deliveries
Encryption at Rest
Sensitive data stored in our databases is encrypted at rest using AES-256 encryption. This includes:
- User credentials (hashed with bcrypt)
- API keys (encrypted)
- TAK Server certificates and credentials
- Payment information (handled by Stripe PCI-compliant infrastructure)
Authentication & Access Control
User Authentication
- Secure password requirements enforced
- Session management with automatic expiration
- Email verification for new accounts
API Authentication
- Unique API keys per user with configurable permissions
- API keys can be rotated or revoked at any time
- Rate limiting to prevent abuse
TAK Server Authentication
- SSL/TLS certificate-based authentication
- Support for client certificate validation
- Encrypted credential storage
Operational Security
- Principle of Least Privilege: Access to systems and data is restricted to those who need it.
- Audit Logging: All significant actions are logged for security review.
- Dependency Management: Regular updates to address security vulnerabilities.
- Security Testing: Regular security assessments and code reviews.
Incident Response
In the event of a security incident, we follow a structured response process:
- Detection: Automated monitoring and alerting systems
- Containment: Immediate steps to limit impact
- Investigation: Root cause analysis and evidence collection
- Notification: Affected users notified within 72 hours as required
- Remediation: Fixes deployed and systems hardened
- Review: Post-incident review and process improvements
Responsible Disclosure
We appreciate the security research community's efforts to help keep our users safe. If you discover a security vulnerability, please report it responsibly:
- Email us at sales@getgotak.com with details
- Allow reasonable time for us to address the issue before public disclosure
- Do not access or modify other users' data
- Do not perform actions that could harm the service or its users
Compliance
We are committed to maintaining compliance with applicable regulations and industry standards:
- GDPR compliance for EU users
- Payment processing through PCI-DSS compliant providers (Stripe)
- Regular security assessments
Questions?
If you have questions about our security practices or want to report a security concern, please contact us:
GoTAK LLC
Email: sales@getgotak.com
Website: https://getgotak.com