Security Policy

Last Updated: June 18, 2025

Introduction

At Hostraha, we are committed to maintaining the highest standards of security to protect our customers' data and infrastructure. This Security Policy outlines the measures we take to ensure the integrity, confidentiality, and availability of our systems and your data.

Data Center Security

Our physical infrastructure is housed in state-of-the-art data centers across Africa and globally, with the following security measures:

  • 24/7 physical security with on-site security personnel
  • Biometric access controls and multi-factor authentication
  • CCTV surveillance with at least 90 days of footage retention
  • Advanced fire detection and suppression systems
  • Redundant power systems including UPS and backup generators
  • Environmental controls for temperature and humidity

All data centers are certified to meet or exceed Tier 3 standards, with SOC 2 Type II and ISO 27001 certifications.

Network Security

We implement multiple layers of network security to protect against unauthorized access and attacks:

  • Advanced DDoS protection with automatic mitigation
  • Web Application Firewall (WAF) to filter malicious traffic
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Network segmentation and isolation between customers
  • Regular vulnerability scanning and penetration testing
  • Real-time traffic monitoring and anomaly detection
  • TLS 1.2+ encryption for all data in transit

Data Protection

We implement comprehensive data protection measures:

  • AES-256 encryption for all data at rest
  • Daily automated backups with off-site replication
  • Customer data isolation and segregation
  • Strict access controls based on the principle of least privilege
  • Secure deletion processes when data is removed
  • Regular data protection impact assessments

Authentication and Access Control

We implement strict authentication and access control mechanisms:

  • Multi-factor authentication for all customer and admin accounts
  • Role-based access control (RBAC) for all systems
  • Password policies enforcing complexity and regular rotation
  • Session timeout and automatic logoff mechanisms
  • IP-based access restrictions and whitelisting capabilities
  • Detailed audit logs of all authentication and access activities

Software Security

Our development and deployment processes follow security best practices:

  • Secure Software Development Lifecycle (SSDLC) methodology
  • Regular code reviews and static code analysis
  • Vulnerability scanning in development and production environments
  • Automated security testing in CI/CD pipelines
  • Regular patching and updates for all systems
  • Containerization for improved isolation and security

Compliance and Certifications

Hostraha maintains compliance with industry standards and regulations:

  • ISO 27001 Information Security Management
  • SOC 2 Type II certification
  • GDPR compliance for EU customer data
  • Kenya Data Protection Act compliance
  • South Africa POPIA compliance
  • Nigeria Data Protection Regulation compliance
  • PCI DSS compliance for payment processing

Copies of our compliance certifications are available to enterprise customers upon request under NDA.

Security Incident Response

We maintain a comprehensive Security Incident Response Plan:

  • 24/7 monitoring and alerting systems
  • Dedicated security incident response team
  • Clearly defined incident classification and escalation procedures
  • Regular security incident response drills
  • Customer notification protocols in accordance with applicable regulations
  • Post-incident analysis and continuous improvement process

Employee Security

Our security practices extend to our personnel:

  • Background checks for all employees
  • Regular security awareness training
  • Mandatory security certifications for technical staff
  • Strict non-disclosure and confidentiality agreements
  • Clear desk policy and physical security measures

Customer Security Responsibilities

While we maintain high standards of security for our infrastructure, customers are responsible for:

  • Securing access credentials for their Hostraha accounts
  • Implementing appropriate security for applications they deploy
  • Maintaining security of their own client systems and networks
  • Promptly applying security updates to their applications
  • Reporting suspected security incidents promptly
  • Following our security best practice recommendations

Security Vulnerability Reporting

We appreciate the work of security researchers and the broader community. If you discover a security vulnerability in our services:

  • Please report it to security@hostraha.com
  • Provide sufficient information to reproduce and validate the issue
  • Allow reasonable time for us to address the vulnerability before disclosure
  • We offer a responsible disclosure program with recognition for verified vulnerabilities

Changes to This Policy

We may update this Security Policy from time to time to reflect changes in our security practices or to meet new regulatory requirements. We will notify customers of any significant changes to this policy.

Contact Us

If you have any questions about our security practices or this Security Policy, please contact us at:

Hostraha Security Team
15th Floor, Utalii Lane, View Park Towers
Nairobi, Kenya
Email: security@hostraha.com
Phone: +254708 002 001