Security Portal
Security Portal
Security Portal
Security Portal
At KushoAI, data privacy and security are at the core of everything we do. This portal provides insights into our security posture and allows you to request access to our security documentation. We are SOC 2 Type II and ISO 27001 compliant.
Our cloud platform, accessible at [https://app.kusho.ai](https://app.kusho.ai), is hosted on AWS in the Stockholm (eu-north-1) region. We also offer an on-premises deployment with the same functionality as our public cloud, plus additional security and enterprise features as part of our Enterprise plan.
Most customers rely on our public deployment for test automation. However, if your organization operates in a highly regulated industry—such as healthcare, finance, or government—and requires enhanced privacy controls, contact us to explore an enterprise on-prem deployment.
At KushoAI, data privacy and security are at the core of everything we do. This portal provides insights into our security posture and allows you to request access to our security documentation. We are SOC 2 Type II and ISO 27001 compliant.
Our cloud platform, accessible at [https://app.kusho.ai](https://app.kusho.ai), is hosted on AWS in the Stockholm (eu-north-1) region. We also offer an on-premises deployment with the same functionality as our public cloud, plus additional security and enterprise features as part of our Enterprise plan.
Most customers rely on our public deployment for test automation. However, if your organization operates in a highly regulated industry—such as healthcare, finance, or government—and requires enhanced privacy controls, contact us to explore an enterprise on-prem deployment.
Compliances
Compliances
Compliances
Compliances




Product Security
Secure software development
lifecycle (SDLC) with regular
security reviews
Automated and manual
security testing, including static
and dynamic analysis
Regular penetration testing by
third-party security firms
Protection against common
web vulnerabilities
(OWASP Top 10, etc.)
Secure authentication and
authorization mechanisms
(OAuth, SSO)
Role-based access control
(RBAC) for fine-grained
permissions
End-to-end encryption for
data in transit and at rest
Data Security
Data encryption: AES-256 for
storage, TLS 1.2+ for transmission
Data integrity monitoring and
anomaly detection
Regular data backups with
encrypted storage and
disaster recovery plans
Granular data access policies with
audit logs
Data classification and handling
policies based on sensitivity levels
Protection against unauthorized data
modifications or deletions
Legal
Compliance with SOC 2 Type II
and ISO 27001
Terms of Service and
Acceptable Use Policy enforcement
Data Processing Agreements (DPA)
available for customers
Subprocessor transparency and
vendor security assessments
Incident response and breach
notification policies
Legal obligations for data retention
and deletion
Data Privacy
No unnecessary collection of
personal data; minimal data retention
User-controlled data deletion and
anonymization options
Privacy-by-design approach in all
features and services
Transparent data usage policies and
user consent mechanisms
Access Control
Role-based access control (RBAC)
with least privilege principles
Just-in-time (JIT) access provisioning
for sensitive operations
Secure access logging and real-time
monitoring
Strict access controls for
production environments
Infrastructure
Hosted on AWS in the eu-north-1
region with high availability
Network security measures: firewalls,
DDoS protection, IDS/IPS
Regular vulnerability assessments
and patch management
Cloud security best practices and
least-privilege access for
cloud resources
Corporate Security
Employee security awareness
training and phishing simulations
Background checks and security
screening for employees
Strict policies for handling customer
data and internal access controls
Secure internal communication tools
and encrypted messaging
Product Security
Secure software development
lifecycle (SDLC) with regular
security reviews
Automated and manual
security testing, including static
and dynamic analysis
Regular penetration testing by
third-party security firms
Protection against common
web vulnerabilities
(OWASP Top 10, etc.)
Secure authentication and
authorization mechanisms
(OAuth, SSO)
Role-based access control
(RBAC) for fine-grained
permissions
End-to-end encryption for
data in transit and at rest
Data Security
Data encryption: AES-256 for
storage, TLS 1.2+ for transmission
Data integrity monitoring and
anomaly detection
Regular data backups with
encrypted storage and
disaster recovery plans
Granular data access policies with
audit logs
Data classification and handling
policies based on sensitivity levels
Protection against unauthorized data
modifications or deletions
Legal
Compliance with SOC 2 Type II
and ISO 27001
Terms of Service and
Acceptable Use Policy enforcement
Data Processing Agreements (DPA)
available for customers
Subprocessor transparency and
vendor security assessments
Incident response and breach
notification policies
Legal obligations for data retention
and deletion
Data Privacy
No unnecessary collection of
personal data; minimal data retention
User-controlled data deletion and
anonymization options
Privacy-by-design approach in all
features and services
Transparent data usage policies and
user consent mechanisms
Access Control
Role-based access control (RBAC)
with least privilege principles
Just-in-time (JIT) access provisioning
for sensitive operations
Secure access logging and real-time
monitoring
Strict access controls for
production environments
Infrastructure
Hosted on AWS in the eu-north-1
region with high availability
Network security measures: firewalls,
DDoS protection, IDS/IPS
Regular vulnerability assessments
and patch management
Cloud security best practices and
least-privilege access for
cloud resources
Corporate Security
Employee security awareness
training and phishing simulations
Background checks and security
screening for employees
Strict policies for handling customer
data and internal access controls
Secure internal communication tools
and encrypted messaging
Product Security
Secure software development
lifecycle (SDLC) with regular
security reviews
Automated and manual
security testing, including static
and dynamic analysis
Regular penetration testing by
third-party security firms
Protection against common
web vulnerabilities
(OWASP Top 10, etc.)
Secure authentication and
authorization mechanisms
(OAuth, SSO)
Role-based access control
(RBAC) for fine-grained
permissions
End-to-end encryption for
data in transit and at rest
Data Security
Data encryption: AES-256 for
storage, TLS 1.2+ for transmission
Data integrity monitoring and
anomaly detection
Regular data backups with
encrypted storage and
disaster recovery plans
Granular data access policies with
audit logs
Data classification and handling
policies based on sensitivity levels
Protection against unauthorized data
modifications or deletions
Legal
Compliance with SOC 2 Type II
and ISO 27001
Terms of Service and
Acceptable Use Policy enforcement
Data Processing Agreements (DPA)
available for customers
Subprocessor transparency and
vendor security assessments
Incident response and breach
notification policies
Legal obligations for data retention
and deletion
Data Privacy
No unnecessary collection of
personal data; minimal data retention
User-controlled data deletion and
anonymization options
Privacy-by-design approach in all
features and services
Transparent data usage policies and
user consent mechanisms
Access Control
Role-based access control (RBAC)
with least privilege principles
Just-in-time (JIT) access provisioning
for sensitive operations
Secure access logging and real-time
monitoring
Strict access controls for
production environments
Infrastructure
Hosted on AWS in the eu-north-1
region with high availability
Network security measures: firewalls,
DDoS protection, IDS/IPS
Regular vulnerability assessments
and patch management
Cloud security best practices and
least-privilege access for
cloud resources
Corporate Security
Employee security awareness
training and phishing simulations
Background checks and security
screening for employees
Strict policies for handling customer
data and internal access controls
Secure internal communication tools
and encrypted messaging
Welcome to a new era of software engineering

© Copyright 2025, All Rights Reserved by Kusho, Inc.
Welcome to a new era of software engineering

© Copyright 2025, All Rights Reserved by Kusho, Inc.
Welcome to a new era of software engineering

© Copyright 2025, All Rights Reserved by Kusho, Inc.