Security Overview

Effective: October 1, 2025 Last updated: January 29, 2026 Support@kavacorellc.com +1-888-808-2683

We design for security by default: minimal data collection, least-privilege access, change control, and vetted vendors. This page summarizes our general controls and how to report a security issue.

This page is a general overview and not a guarantee of any specific control. Customer-specific security obligations and SLAs, if any, are defined in signed agreements (MSA/SOW/DPA).

1) Scope & shared responsibility

We protect systems and data we control (our website, internal tooling, and approved vendors used for delivery). Customers remain responsible for their own environments, credentials, endpoints, user access policies, and third-party services they connect.

2) Data handling (minimization, classification, retention)

  • Typical data: contact details, support communications, project artifacts provided by the customer, and minimal operational logs.
  • Sensitive data: we avoid processing sensitive categories by default (government IDs, biometrics, precise location, health data) unless explicitly required by contract and lawful basis is established.
  • Retention: we retain information only as long as needed for service delivery, security, legal, or audit needs, then delete or de-identify where feasible.

3) Technical & organizational controls

AreaExamples of controls
Encryption TLS for data in transit; storage protections provided by our hosting vendors; secrets not committed to source control.
Access control Least privilege, role-based access where supported, MFA for administrative accounts, session controls, and auditing where available.
Backups & continuity Backups for critical assets where applicable; restore testing on a cadence aligned to the service and risk.
Hosting posture HTTPS enforced, patching and configuration hardening, reduced attack surface for marketing pages; WAF/CDN options when appropriate.
Monitoring Security and operational logs for investigation; anomaly review; retention limited to what’s necessary.
People & process Confidentiality obligations, access reviews, and internal playbooks for support and engineering.

Controls may vary by engagement and are refined over time.

4) Secure delivery lifecycle

  • Peer review for meaningful changes; dependency updates and vulnerability monitoring where practical.
  • Separation of environments (dev/stage/prod) when applicable; rollback planning for production changes.
  • Secrets management outside source control; least-privilege credentials and rotation as appropriate.
  • Privacy-by-design: collect minimum data, disable unused services, and limit access.

5) Vendors & subprocessors

We use vetted providers for functions like hosting, email, analytics (when enabled), support tools, and other infrastructure. Where a vendor may process personal information, we use contractual safeguards and publish our list at /legal/subprocessors.

6) Incident response

If we become aware of a security incident that materially affects customer data, we investigate promptly and notify impacted customers without undue delay where required by law or contract.

SeverityDescriptionTypical actions
Low Minor issue with limited impact; contained by defense-in-depth. Log, remediate in standard cycle, document outcome.
Medium Elevated risk or limited scope; investigation required. Prioritized remediation; customer notice if relevant to their systems or data.
High Confirmed compromise or material risk to customer data/service. Containment, urgent remediation, customer notifications and coordination where applicable.

7) Vulnerability disclosure

We welcome coordinated disclosure. Email Support@kavacorellc.com with: affected URL(s), steps to reproduce, impact, and your contact info.

  • Use good-faith testing that avoids privacy violations, data destruction, and service disruption.
  • Do not access customer data without explicit permission.
  • Test only assets we own/control (or where you have authorization).

security.txt (recommended)

Publish at /.well-known/security.txt on your domain.

Contact: mailto:Support@kavacorellc.com
Policy: https://kavacore.ai/legal/security
Preferred-Languages: en
Canonical: https://kavacore.ai/.well-known/security.txt
Expires: 2026-10-01T00:00:00Z

8) Website hardening (headers & CSP)

We enforce HTTPS and recommend modern security headers. The examples below are starting points. Content Security Policy (CSP) is powerful but can break chat/analytics/widgets unless you allow their domains.

Apache (.htaccess) example

# NOTE: Example only. Test in staging first.

# Force HTTPS
RewriteEngine On
RewriteCond %{HTTPS} !=on
RewriteRule ^ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]

# HSTS (enable only after confirming HTTPS everywhere)
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"

# Baseline hardening headers
Header set X-Content-Type-Options "nosniff"
Header set Referrer-Policy "strict-origin-when-cross-origin"
Header set X-Frame-Options "DENY"
Header set Permissions-Policy "camera=(), microphone=(), geolocation=()"

# CSP (tight baseline; expand for approved widgets)
Header set Content-Security-Policy "default-src 'self'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; script-src 'self'; connect-src 'self'; frame-ancestors 'none'; base-uri 'self'; form-action 'self'; upgrade-insecure-requests"

Nginx example

# NOTE: Example only. Add inside your server {} block.
add_header X-Content-Type-Options "nosniff" always;
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
add_header X-Frame-Options "DENY" always;
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;

# CSP (expand for approved third-party widgets)
add_header Content-Security-Policy "default-src 'self'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; script-src 'self'; connect-src 'self'; frame-ancestors 'none'; base-uri 'self'; form-action 'self'; upgrade-insecure-requests" always;

If you add LiveChat, GTM/GA4, maps, or booking tools, update CSP to allow their domains for script-src, connect-src, and frame-src where required.

9) Contact

Security reports: Support@kavacorellc.com
Phone: +1-888-808-2683

Current status: No known active incidents

Scroll to Top