Privacy & Security

Slingshot’s security and privacy framework combines commercial best practices with government-grade rigor. We follow a zero-trust approach, encrypt all data in motion and at rest, and continuously monitor our systems to protect against emerging threats. Whether you’re a commercial operator, researcher, or federal mission partner, Slingshot provides a secure foundation for confident decision-making
Icon

Data Protection

  • AES-256 encryption for all data at rest, TLS 1.3 for all data in transit.
  • Hardware Security Module (HSM)-based key management.
  • Configurable data retention and deletion policies for customer control.
Icon

Identity & Access Management

  • Secure authentication with Okta SSO and multi-factor authentication (MFA).
  • Role-Based Access Control (RBAC) with fine-grained permissions.
  • Continuous activity logging and anomaly detection.
Icon

Privacy Governance

  • Compliance with GDPR, CCPA, and U.S. federal data protection standards.
  • Transparent data-handling and audit reporting.
  • Dedicated Privacy Officer oversight and annual compliance reviews.
Icon

Secure Development & Operations

  • Security integrated across our DevSecOps lifecycle.
  • Code scanning and dependency audits.
  • Continuous vulnerability management and patch automation.
Icon

Monitoring & Support

  • 24/7 system monitoring through SIEM and automated alerting.
  • Incident response procedures aligned with NIST 800-61.
  • Threat detection and anomaly response managed by a dedicated SOC.
Icon

Government Compliant

  • FedRAMP Moderate (inherited)
  • NIST SP 800-53 Rev 5
  • SOC 2 Type II (in progress)
  • GDPR / CCPA Compliant
  • ITAR / EAR Awareness Controls