Security at Telos
We treat security as a core product requirement, not an afterthought.
Least Privilege
We enforce strict access controls. Access is granted only when necessary and revoked immediately when not.
Auditability
Changes to infrastructure and data are logged and auditable. We know who did what, and when.
Responsible Disclosure
We welcome reports from the security community and address vulnerabilities promptly.
Report a Vulnerability
If you believe you have found a security vulnerability in any Telos Technologies product, please report it to us immediately.
What to include:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- The product or service affected (e.g., PGPulse, BaseKit)
- The potential impact of the vulnerability