Security, Compliance & Trust
At Scalyz, security, data protection, and operational resilience are core principles embedded in the design and operation of our platform. This page transparently outlines our infrastructure, compliance commitments, and governance practices.
Last Updated: 06 March 2026
1. Infrastructure & Hosting
Scalyz is hosted on Amazon Web Services (AWS) infrastructure within the European Union.
- Primary region: EU (eu-north-1)
- Infrastructure deployed using Infrastructure as Code (IaC)
- Multi-tenant architecture with logical isolation at organization level
- Daily encrypted backups
Enhanced Isolation – Enterprise Premium
For clients requiring advanced isolation, Scalyz can deploy:
- Dedicated infrastructure
- Isolated database environment
- Separate application stack
- Independent network traffic
This option is subject to a specific contractual agreement and tailored commercial terms.
2. Availability & Support
Scalyz targets:
99% annual service availability
Support Hours
Support is available:
- Monday to Friday
- 9:00 AM – 6:00 PM (CET / CEST)
- Excluding French public holidays
Support Levels
Standard Support
- Response within 8 business hours
Premium Support
- Response within 4 business hours
Security incidents and service-blocking disruptions are handled with highest priority regardless of support tier.
Resolution time depends on severity, complexity, and operational impact.
3. Monitoring & Supervision
Scalyz implements multi-layer monitoring:
- Internal supervision via AWS CloudWatch
- External 24/7 monitoring via BetterUptime
- Automated alerting
- Technical on-call escalation triggered after 1 hour if automated remediation fails
Public status page:
👉 Scalyz status
In case of major incident:
- Initial notification within 4 hours
- Public updates every 4 hours
4. Business Continuity & Disaster Recovery
Scalyz maintains an internal business continuity procedure enabling full infrastructure redeployment using Infrastructure as Code (IaC).
- Cross-region recovery capability
- Daily encrypted backups
Recovery Objectives
- RTO (Recovery Time Objective): 24 hours
- RPO (Recovery Point Objective): 24 hours
A disaster recovery exercise was conducted on December 22, 2025.
An annual recovery test is scheduled during the third week of December, a period of lower activity.
Affected users are informed at least three (3) months in advance via email notification associated with their registered user account, as well as through the public status page where applicable.
Tests are organized to minimize operational impact and do not result in data loss.
5. Data Protection & GDPR Compliance
Scalyz operates in compliance with the General Data Protection Regulation (EU) 2016/679 (GDPR).
Responsibility model:
- Enterprise clients act as Data Controllers
- Scalyz acts as Data Processor
Our Data Processing Agreement (DPA) is available at:
👉 Scalyz
Related documents:
- Privacy Policy
- Cookie Policy
- Enterprise Terms & Conditions
6. Nature of Processed Data
Scalyz does not process:
- Biometric data
- Special category (sensitive) data
- Video data
Data processed may include:
- Professional identification information
- Technical activity performed during lab sessions
- Executed commands
- Files generated during assessments
Behavioral analysis is strictly limited to technical performance evaluation and does not involve discriminatory profiling.
7. Security Measures
Scalyz implements, among others:
- Encryption in transit (TLS/HTTPS)
- Encryption at rest (RDS, S3)
- Daily encrypted backups
- Mandatory Multi-Factor Authentication (MFA) for internal access
- VPN-protected administrative access
- Role-based access control following the least privilege principle
- Log retention limited to 1 year
Regular internal security assessments are conducted.
8. Incident Management & Security
Scalyz maintains an internal incident management procedure.
In case of incident:
- Immediate prioritization of security incidents
- Initial notification within 4 hours for major incidents
- Ongoing communication via the public status page
Dedicated security contact:
📧 security@scalyz.com
Personal data breaches are handled in accordance with GDPR obligations.
9. Transparency & Logging
Enterprise clients may download:
- Candidate technical activity logs
- Executed commands
- Files generated during lab sessions
Additional requests for technical logs may be reviewed by the support and security teams.
10. Responsible Artificial Intelligence
Scalyz may use artificial intelligence tools for advanced reporting generation.
- Data transmitted for AI processing is anonymized
- No personally identifiable information is shared
- AI serves as a decision-support tool and not as an autonomous decision-maker
11. Governance & Roadmap
Scalyz maintains:
- An internal security lead
- A documented incident management procedure
- A maintained record of processing activities
- Internal backup policies
ISO 27001 certification is targeted for 2026.
Commitment
Scalyz is committed to maintaining transparency, security, and regulatory compliance in order to ensure trust for its enterprise clients, partners, and users.