Rook
Security

Security Without Compromise

At Rook, we take security very seriously and make no compromises when it comes to protecting your data and systems.

Our Security Commitment

Security is at the core of everything we do at Rook. We understand that our customers trust us with their most sensitive data and operations, which is why we've built our platform with security as a fundamental principle, not an afterthought.

Our security team works tirelessly to stay ahead of emerging threats, regularly conducting security assessments and penetration testing to identify and address potential vulnerabilities before they can be exploited.

We implement defense-in-depth strategies, with multiple security layers throughout our infrastructure and application stack. From secure development practices to rigorous access controls, every aspect of our platform is designed with your security in mind.

End-to-End Encryption

We implement end-to-end encryption for all sensitive data, even internally. Our zero-trust architecture ensures that data remains encrypted throughout its lifecycle.

Comprehensive Encryption

All data is encrypted at rest and in transit at both application and database levels, using industry-leading AES-256 encryption standards.

Segregated Infrastructure

Our proxied and segregated server architecture leaves attackers no room for lateral movement, with strict network isolation between components.

Defense in Depth Strategy

At Rook, we implement a multi-layered security approach that protects your data at every level:

  • Regular penetration testing by independent security firms
  • Continuous vulnerability scanning and remediation
  • Strict access controls with principle of least privilege
  • Comprehensive audit logging and monitoring

Responsible Disclosure

We believe in transparency and collaboration with the security community. If you discover a potential security vulnerability in our systems, we encourage you to disclose it to us responsibly.

Responsible Disclosure Guidelines

  • Provide detailed information about the vulnerability, including steps to reproduce
  • Allow reasonable time for us to address the issue before public disclosure
  • Do not access, modify, or delete data beyond what is necessary to demonstrate the vulnerability
  • Act in good faith and avoid privacy violations, destruction of data, or interruption of services

We commit to acknowledging receipt of vulnerability reports within 24 hours and providing regular updates on our progress. We do not pursue legal action against security researchers who follow responsible disclosure principles.

Report a Security Vulnerability

Please email our security team with your findings