• HeyPico
  • About Us
  • Support
Try Now

Security, Compliance, & Data Protection

Security Center

Read about HeyPico’s security, compliance and data protection.
Pico remembers everything you tell it, it also deletes if you want it to forget.

Certifications

CASA Tac Security Tier 2

Security Controls

Controls verified from deployment scan; concise format without sensitive technical detail.

24 of 24 Controls Implemented
TLS 1.3 for public domains Checked
TLS in transit (proxy + certificate at origin) Checked
Credentials stored in Secrets Manager; encryption at rest (KMS) Checked
Credentials fetched at startup; no plain secrets in manifests Checked
Separate secret path per service and environment Checked
IAM least privilege for Secrets Manager access Checked
Credential and script volumes mounted read-only Checked
Workflow/credential data encryption (managed key) Checked
Redundancy (multi-cluster, multi-AZ, secret per environment) Checked
Load balancer per service; inbound HTTPS only Checked
Proxy + Under Attack Mode (managed challenge) Checked
DDoS protection (SSL/TLS, network-layer, HTTP) Checked
WAF (rate limiting; managed rules per plan) Checked
Kubernetes (cluster, node group, namespace, ingress) Checked
Images from central registry; imagePullSecrets Checked
Autoscaling (HPA; KEDA for queue-based workers) Checked
Network isolation (VPC, security group per layer) Checked
Ingress HTTPS only; redirect and certificate Checked
Geographic redundancy (multi-AZ; multi-region planned) Checked
Per-environment isolation (namespace and secret) Checked
Automated backup (DB to object storage; scheduled AMI) Checked
Point-in-time recovery (from DB backup or AMI) Checked
24/7 Uptime monitoring and alerting Checked
Container health checks and restart policy Checked
  • LinkedIn
  • X
  • Telegram

ABOUT

  • Our Company

SUPPORT

  • Get in Touch
  • Security Center

LEGAL

  • Terms & Conditions
  • Privacy Policy

[email protected]
HeyPico.ai © 2025-2026

Scroll to Top