Security

Security at
Solis

Your job site data is your business. We take protecting it seriously — from the infrastructure up.

TLS 1.2+ AES-256 at Rest Security First 99.9% Uptime SLA

How we protect you

Built secure from the ground up

Infrastructure Security

All data flows over encrypted connections and is stored with industry-leading encryption at rest. Our cloud infrastructure meets the highest compliance standards available.

  • All data encrypted in transit (TLS 1.2+) and at rest (AES-256)
  • Hosted on industry-leading cloud infrastructure with enterprise-grade security
  • Automated backups with geographic redundancy
  • Network isolation and firewall protection for all services

Application Security

Access to your data is controlled at every layer. Role-based permissions mean crew members only see what they need — contractors maintain full administrative control.

  • Authentication via secure token-based system with encrypted credential storage
  • Role-based access controls — contractors see their data, crew members see only assigned jobs
  • Session management with automatic timeout
  • Input validation and protection against OWASP Top 10

Data Privacy

We collect only what the platform needs to function. Location data is tied to specific check-in actions — never passive, never background. Your data is yours.

  • GPS data collected only during active check-ins — no background tracking
  • Media files stored in isolated, encrypted storage
  • No data sold to third parties — ever
  • Full data export and deletion available on request

Operational Security

Security is a continuous process. Our team conducts regular assessments and maintains documented procedures for responding to incidents quickly and transparently.

  • Regular security assessments and code review
  • Dependency monitoring for known vulnerabilities
  • Incident response plan with defined escalation procedures
  • Access to production limited to essential personnel with MFA

Compliance & Certifications

We hold ourselves to high security standards and implement industry best practices to protect your data.

TLS 1.2+ In Transit
AES-256 At Rest
Responsible Disclosure

Found a vulnerability?

If you discover a security vulnerability in the Solis platform, please report it to us directly. We take all reports seriously and will respond within 48 hours to acknowledge receipt and begin our assessment.

  • Don't access or modify other users' data during research
  • Don't publicly disclose the issue before we've had a chance to address it
  • Provide enough detail to reproduce the issue clearly

Security contact

joshua@coresolis.com

We respond within 48 hours

CVE credit given when appropriate

Security team monitoring 24/7