Trust

Security at Kagama Kanban.

We're a small EU-hosted team running real customer data. We don't have SOC 2 yet — and we're not going to lie about it. Here's what we actually do.

Controls in place today

Practical, verifiable. If you need details for your procurement team, our DPA covers it.

Encryption

TLS 1.3 in transit. AES-256 at rest for both Postgres and S3 attachments — keys managed in AWS KMS.

tls 1.3 · aes-256-gcm

Authentication

Argon2id for password hashes. Optional TOTP 2FA on every account. SAML / OIDC SSO available on Team and Business plans.

argon2id · totp · saml 2.0 · oidc

Backups

Daily encrypted snapshots. 30-day retention. Monthly restore tests run by the on-call engineer — not just a cron that nobody verifies.

RPO 24h · RTO 4h

Access control

Two-tier admin (org and project). Tamper-evident audit log on every Team plan. IP allowlists on Business.

audit log · ip allowlist · scim coming q3

Vulnerability disclosure

Security researchers welcome. We respond within 48 hours, fix within the supported quarter, and credit you publicly when patched.

security@kagama.io · 90-day disclosure SLA

Compliance posture

GDPR-aligned, EU-hosted (Frankfurt). DPA available on demand. SOC 2 Type II is on our 2026 roadmap — happy to share progress under NDA.

gdpr · dpa · eu data residency

Subprocessors

The third parties we share customer data with. We update this table whenever we add or remove one — subscribe via your workspace admin to get notified.

ServicePurposeRegionSince
AWS FrankfurtApplication hosting + S3 attachmentseu-central-12024-08
SendGridTransactional email (verify, reset, invites)EU pool2024-08
StripePayment processing & customer portalEU + US2024-09
Sentry (EU)Application error monitoring (no PII)eu2025-01

Reporting a vulnerability

Email security@kagama.io — encrypted with the GPG key below. We acknowledge within 48 hours, ship a fix within the quarter, and credit you publicly once patched.

fingerprint:
4F2A 7B91 D3C8 6E55 0F23 · 9A4E B1D7 5C82 3F46 8A91