1. Security Program
- Role-based access controls with least-privilege enforcement.
- Multi-factor authentication for internal administrative systems.
- Encryption in transit and at rest for supported storage and service components.
- Continuous logging, alerting, and operational monitoring.
2. Incident Response
Qume maintains incident response procedures for detection, containment, remediation, and communication. Material incidents are escalated according to impact severity.
3. Responsible Disclosure
Security researchers can report vulnerabilities to security@qume.ai with reproduction details. Do not access data that is not yours or disrupt production systems.
4. Customer Security Requests
For trust documents and security questionnaires, contact security@qume.ai.