Trust Center
Learn how Rook protects your data and maintains the security, privacy, and compliance of our platform.
Our Security Commitment
At Rook, security is not just a feature—it's the foundation of everything we build. We understand that our customers trust us with their most sensitive data, which is why we've implemented comprehensive security measures at every level of our infrastructure and application stack.
Our security program is designed with a defense-in-depth approach, implementing multiple layers of controls to protect your data. From secure development practices to rigorous access controls and regular security assessments, we're committed to maintaining the highest standards of security.
Data Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. We implement end-to-end encryption for sensitive information, ensuring your data remains protected throughout its lifecycle.
Infrastructure Security
Our infrastructure is hosted in SOC 2 compliant data centers with 24/7 physical security, redundant power, and network connectivity. We implement network segmentation, firewalls, and intrusion detection systems to protect against unauthorized access.
Access Controls
We implement strict access controls based on the principle of least privilege. All access to production systems is logged and monitored, with multi-factor authentication required for all administrative access.
Continuous Monitoring
Our security team continuously monitors our systems for suspicious activity and potential vulnerabilities. We use automated tools and manual reviews to identify and address security issues before they can be exploited.
Contact Us
If you have questions or comments about our security practices or compliance program, please contact our security team at: