Tenant isolation
Every record in Kairos carries a tenantId. Reads, writes, and AI retrieval are scoped by tenant at the data layer. Cross-tenant access is structurally prevented, not policy-prevented.
Kairos runs supply chain operations for real companies.
The platform handles freight, customer data, financial information, and the messages that move between them. We treat the security, privacy, and reliability of that work as a product surface — not a marketing surface — and the pages linked here describe how we run it.
Every record in Kairos carries a tenantId. Reads, writes, and AI retrieval are scoped by tenant at the data layer. Cross-tenant access is structurally prevented, not policy-prevented.
All connections to Kairos use TLS 1.2 or higher. HSTS is enforced on app.elyonsci.ai and elyonsci.ai.
Customer data is stored in Google Cloud Firestore and AWS, both of which apply AES-256 encryption at rest by default. Application secrets are stored in managed secret stores; no credentials are committed to source.
Customer access uses Firebase Authentication with role-based access controls. Internal access is least-privilege, MFA-enforced, and reviewed on a documented cadence.
Records are never hard-deleted from production. Deletions are logged with timestamp and actor, and recoverable for the contracted retention window.
Material actions — record creation, modification, deletion, exports, configuration changes — are recorded in append-only audit trails scoped per tenant.
All production changes flow through pull requests with required code review, automated security scanning (GitHub Advanced Security: CodeQL, Secret Scanning, Push Protection, Dependabot), and protected-branch deployment gates.
Dependencies are continuously scanned. High and critical severity vulnerabilities are triaged within one business day. Patch SLAs are documented in our internal vulnerability management policy and surfaced to enterprise customers under NDA.
We maintain a documented incident response plan with defined severity levels, on-call rotation, and customer notification thresholds. Material incidents affecting customer data are communicated to affected customers without undue delay and within the timelines required by applicable law and contract.
Customer data is replicated across multiple availability zones via Firestore and AWS. Recovery objectives are documented and tested. Customers under NDA may request our current RTO/RPO targets.
Sub-processors are reviewed before onboarding and tracked on a published list. See /sub-processors.
Background checks are performed on all personnel with production access. Security training is delivered at onboarding and refreshed annually. Access is revoked the same day employment ends.
Kairos is an AI-native platform. AI is governed as a first-class system, not an unbounded capability:
Customer data belongs to the customer. We process it on the customer's behalf under the terms of the Master Services Agreement and Data Processing Addendum.
Security questions and vulnerability reports — security@elyonsci.ai
Privacy and data subject requests — support@elyonsci.ai
Compliance documentation requests (enterprise customers and prospects under NDA) — support@elyonsci.ai
Enterprise prospects: request the security questionnaire, current sub-processor list, and SOC 2 progress letter via support@. Material vulnerabilities go to security@ under our coordinated disclosure policy.