Security policy

Public security policy for Marketplace apps and integrations.

This page describes the public security position for Kobik Tech Marketplace apps, system integrations, and website operations. It is written for customers, security reviewers, and procurement teams assessing deployment risk.

Principle of least privilege Documented operating model Security review path
Security principles

How Kobik Tech approaches security for integration products.

These statements focus on practical controls and operating assumptions, not unsupported certification language.

01

Access and permissions are scoped to connector function

Connector workflows are designed around the permissions and platform capabilities required for the supported use case. Administrator setup guidance is treated as part of the security model, not an afterthought.

Scoped setup Admin controls Documented behavior
02

Credentials and connection settings are treated as sensitive configuration

Where integrations require tokens, secrets, or connection settings, Kobik Tech uses the platform mechanisms needed to operate the app and limits handling to what the connector surface requires.

03

Documentation is part of the security surface

Documentation, trust pages, and support routes are maintained so teams can understand how setup, linking, sync, and escalation work in practice.

04

Public claims stay within published evidence

Kobik Tech does not use this page to imply certifications, attestations, or compliance positions that are not explicitly published and supportable. Public security content is limited to statements we can stand behind operationally.

Public trust materials No inflated claims Supportable statements Review follow-up available
Operational meaning

What this means in practice.

Marketplace apps are documented with deployment prerequisites, connector behavior, and operating limits.

Technical guides describe permissions, authentication models, and supported sync patterns for each app surface.

Support routes are available for teams that need help with configuration, deployment, or operational review.

Trust, privacy, and support content is maintained as part of the customer-facing product surface.

Review workflow

Security and procurement follow-up

Start with the Trust Center and connector documentation to review public information.

If your team needs additional clarification, identify the app, environment, and review topic involved.

Security questions, procurement reviews, and operational follow-up can be routed through the existing contact channels.

Vulnerability reporting

How to report a security issue.

If you believe you have found a security issue related to the website, a public page, or a Kobik Tech app surface, contact us directly with enough detail to reproduce or investigate the concern.

Primary

Support mailbox

Use the support address for app-related issues, urgent investigation, and operational follow-up.

Business

General contact

Use the company contact address for review requests, procurement coordination, or additional policy questions.

Context

What to include

Include the affected page or app, environment, reproduction details, and observed behavior so the report can be triaged quickly.