DesignLoop is built with defence-in-depth. Here's exactly how we protect your data, sessions, and infrastructure — and what we expect from you.
Effective March 1, 2026
ThyncLabs treats security as a foundational engineering concern, not a compliance checkbox. We apply a layered security model across infrastructure, application, data, and people — informed by the OWASP Top 10, CIS benchmarks, and industry standard threat modelling.
TLS 1.2+
Encryption in Transit
AES-256
Encryption at Rest
Critical: 24 h
Vulnerability SLA
DesignLoop runs on hardened cloud infrastructure within a single primary region. All production services operate inside a private Virtual Private Cloud (VPC) with strict network segmentation between compute, database, and cache tiers.
Secrets (API keys, database credentials, signing keys) are never stored in source code, version history, or plain-text configuration files. They are injected at runtime via an environment-isolated secrets vault with audited access logs.
Every service account, IAM role, and database user is granted the minimum permissions necessary to perform its function. Broad wildcard policies are prohibited in production.
All production changes require peer review via pull request before merge. Security-sensitive changes (authentication, payment, data access) require review by a security-aware engineer.
We triage and remediate vulnerabilities according to the following SLAs:
Dependencies are monitored continuously. Critical CVEs in direct dependencies are patched and deployed within the SLA window above, independent of the normal release cycle.
Anomaly detection and alerting is configured across authentication events, API error rates, infrastructure metrics, and third-party integrations. All production alerts are routed to an on-call rotation with 24 × 7 coverage.
In the event of a data breach affecting your personal data, we will notify affected users by email within 72 hours of becoming aware of the breach, as required by applicable data protection law. Enterprise customers will be notified directly via their designated security contact.
Security Incidents
DesignLoop is designed with the following frameworks and regulations in mind:
GDPR
General Data Protection Regulation (EU/UK) — data subject rights, lawful basis, DPA available for enterprise customers
CCPA
California Consumer Privacy Act — right to know, delete, and opt-out of sale (we do not sell personal data)
DPDP Act
India's Digital Personal Data Protection Act, 2023 — lawful processing, data fiduciary obligations, grievance redressal
PCI-DSS
Payment Card Industry — all card processing is delegated to Razorpay (Level 1 certified); we hold no card data
OWASP Top 10
Secure development practices and testing are aligned with the OWASP Top 10 web application security risks
SOC 2 (Roadmap)
We are actively working toward SOC 2 Type II certification. Enterprise customers may request our progress report.
We deeply value the security research community. If you discover a vulnerability in DesignLoop, we ask that you report it responsibly so we can address it before it is disclosed publicly.
Security Contact