Security and data privacy

Security is at the core of our business. Elker is trusted by leading organisations for secure data handling and protecting the anonymity of reporters.

Our certifications and controls

ISO 27001 Certification logo by the Global Compliance Certification (GCC)

ISO 27001 certified

Elker is certified with ISO 27001, the international standard for information security management systems. For a copy of our certificate, contact us.

Vanta trust portal for Elker

Vanta trust portal

For a detailed overview of our security controls, procedures, and privacy practices, visit our Vanta Trust Portal.

Our security framework

Zero-trust architecture

We verify every access request, no matter where it comes from. This means even if someone manages to breach one layer of security, they still can't access sensitive data without proper authentication.

Defence-in-depth

Instead of relying on a single security measure, we layer multiple controls throughout our systems. Each layer adds protection and makes it increasingly difficult for potential threats to get through.

Privacy-by-design

We consider privacy implications at every stage of our development process. Privacy protection is integrated into every part of our system.

Continuous improvement

Security threats evolve, and so do we. We regularly update our security measures, perform penetration testing on our systems, and incorporate new protections to stay ahead of emerging threats.

Security governance

Elker's leadership team sets the overall security strategy and regularly reviews the implementation of security controls and metrics to ensure continuous improvement.

Technical security

Single Sign-On (SSO)

Elker supports secure authentication via Single Sign-On (SSO) using industry-standard protocols. Integration with Microsoft Entra and Active Directory enables clients to leverage their Microsoft 365 or on-premises AD accounts for seamless SSO experiences.

Comprehensive penetration testing

We engage independent security experts to conduct full-stack penetration tests on our systems at least annually. Any vulnerabilities discovered are promptly remediated.

Cyber incident response

Elker maintains a comprehensive cyber incident response plan that is regularly reviewed. Our team is prepared to detect, respond to, and recover from potential security incidents rapidly.

Secure development lifecycles

Security is embedded throughout our product development lifecycle. All changes undergo threat modelling and code review for security issues. Third-party libraries are continuously monitored for vulnerabilities. Automated security testing is performed on every code change before deployment.

SOC 2-certified infrastructure

All of Elker's cloud services maintain SOC 2 compliance, ensuring they adhere to strict security and availability standards. Elker will be SOC 2 certified in 2025.

Granular access controls

Access to all Elker systems is governed by the principle of least privilege and enforced by role-based access control (RBAC). Clients have full visibility and control over access permissions for their instances.

Personnel & organisational security

Employee background checks

All Elker staff undergo thorough background checks as part of the hiring process.

Security awareness training

Elker staff complete cybersecurity awareness training to ensure their responsibilities in protecting client data are understood.

Cybersecurity policy adherence

Elker maintains a 100% acceptance rate for our cybersecurity policies, which all staff must review and agree to.

Vendor risk management

We assess the security posture of all third-party vendors, including cloud service providers and contractors, based on the risk they pose. Vendor security is continuously monitored throughout the engagement.

Enterprise data protections

  • AES-256 encryption for data in transit and at rest
  • ISO 27001-certified
  • GDPR compliant
  • SOC 2-certified hosting infrastructure
ISO 27001 CertifiedGDPR Certified

Data privacy at Elker

Reporter anonymity

For reporters who wish to remain anonymous, Elker guarantees that their identity will be protected.

Data minimisation

We only collect the minimum amount of personally identifiable information (PII) needed to enable reporting and communication with authorised parties.

Data protection

All PII is masked in logs and encrypted both in transit and at rest using industry best practices. Access to client data is strictly controlled and audited.

Building trust and transparency with
Interested to find out more?

See how Elker can help with compliance and build a culture of accountability and trust in your organisation.