Orkes Security

Orkes is SOC 2 Type 2 Compliant

Orkes Cloud is SOC 2 Type 2 compliant. If you need a copy of the SOC2 Type 2 report, please reach out to us.

soc logo

Orkes Vulnerability Disclosure Policy

Orkes is committed to maintaining the security of our systems and our customer's information. If you believe you have identified a potential security vulnerability, please follow the guidelines below:

  1. Share with Orkes the full details of any issues you have identified including the target, steps, tools, and artifacts used during discovery
  2. Keep this information private and allow us to fix or address reported vulnerabilities
  3. Do not engage in any activity that can potentially or actually cause harm to Orkes, our customers, or our employees
  4. Do not view, alter, save, store, transfer, or otherwise access the data, and immediately purge all data after reporting the vulnerability to Orkes

Submission Instructions:

Please email us at security@orkes.io to report a vulnerability or security issue that you discovered.

By responsibly submitting your findings to Orkes in accordance with these guidelines Orkes agrees not to pursue legal action against you.