Security Statement
Last updated: December 16, 2025
Overview
At Zhade Labs (“Zhade”, “we”, “us”), protecting customer data and ensuring the security of our services is a core responsibility. We design, build, and operate our products with security in mind at every stage of their lifecycle.
This Security Statement provides an overview of the technical and organizational measures used by Zhade Labs to protect Customer Data processed through its cloud-based services.
This document is intended to complement our:
- Privacy Policy
- End User License Agreement (EULA)
- Data Processing Addendum (DPA)
- Authorized Sub-processor List
Additional contractual documents, including the DPA and the Authorized Sub-processor List, are available to customers upon request.
Scope
This Security Statement applies to all Zhade Labs cloud services and integrations distributed via third-party marketplaces, including Atlassian Marketplace and Google Workspace Marketplace.
Shared responsibility model
Security is a shared responsibility between Zhade and our customers.
Zhade is responsible for:
- Security of the application code and backend services
- Secure configuration of cloud infrastructure
- Access controls, monitoring, and incident response
- Safeguarding Customer Data processed by the Product
Customers are responsible for:
- Managing user access and permissions in connected platforms (e.g., Jira, Google Chat)
- Protecting credentials and administrator accounts
- Configuring integrations in accordance with their internal security policies
Security governance
Zhade follows security-by-design principles across product development and operations:
- Security considerations are incorporated during architecture and design
- Code changes undergo peer review prior to deployment
- Production changes are deployed through controlled CI/CD pipelines
- Access to production systems is limited to authorized personnel only
Infrastructure security
Zhade operates its services on industry-leading cloud infrastructure providers. Key measures include:
- Isolated environments for development, staging, and production
- Network-level protections using cloud-native firewalls and private networking
- Service-to-service authentication and authorization
- No direct public access to internal databases or caches
- Production workloads hosted primarily in the European Union
Access control
Access to systems and data is restricted based on the principle of least privilege:
- Role-based access control (RBAC) for internal systems
- Multi-factor authentication (MFA) for administrative access
- Centralized identity management for staff
- Regular review and revocation of access when no longer required
Data protection and encryption
Zhade implements encryption and data protection measures appropriate to the sensitivity of the data processed:
- Encryption in transit using TLS 1.2 or higher
- Encryption at rest supported by underlying cloud providers
- Secure storage of secrets using managed secret management services
- Tokens and credentials are encrypted or stored in protected secret stores
Logging, monitoring, and detection
We maintain logging and monitoring to support availability, troubleshooting, and security incident detection:
- Application and infrastructure logs are collected centrally
- Logs are protected from unauthorized modification
- Monitoring and alerting are configured for abnormal behavior and service health
- Log retention periods are limited and aligned with operational and legal requirements
Secure development practices
Zhade follows secure software development lifecycle (SDLC) practices, including:
- Peer-reviewed code changes
- Automated testing as part of CI/CD pipelines
- Dependency vulnerability scanning where supported by tooling
- Secure handling of secrets and credentials during development and deployment
Incident response
Zhade has processes in place designed to identify, assess, and respond to security incidents and personal data breaches. In the event of a confirmed incident affecting Customer Data, Zhade follows internal incident response processes intended to support timely investigation, containment, and remediation, taking into account the nature and scope of the incident.
Where required by applicable law or contractual obligations, including the Data Processing Addendum (DPA), Zhade will notify affected customers in accordance with those requirements. Corrective measures may be implemented, as appropriate, to reduce the likelihood of similar incidents occurring in the future.
Business continuity and backups
To support service availability and resilience:
- Cloud infrastructure leverages redundancy and managed availability features
- Backups are performed using cloud-native backup mechanisms
- Backup data is protected and retained for limited periods in accordance with retention policies
Sub-processors and supply chain security
Zhade engages vetted third-party service providers (“sub-processors”) to support the delivery of its services, such as cloud infrastructure, databases, caching, and customer support systems.
All sub-processors:
- are engaged solely to the extent necessary to provide services to Zhade;
- are subject to written data protection and confidentiality obligations no less protective than those set forth in the DPA; and
- process Customer Data only in accordance with Zhade’s documented instructions.
A current list of authorized sub-processors applicable to Zhade’s services is maintained by Zhade and is available to customers upon request.
Employee security awareness
Personnel with access to systems or Customer Data are:
- bound by confidentiality obligations;
- provided with security and privacy awareness guidance appropriate to their role;
- granted access only to systems necessary for their responsibilities.
Compliance and certifications
Zhade Labs does not currently hold independent security certifications such as ISO 27001 or SOC 2.
However, Zhade aligns its security practices with widely recognized industry standards and leverages infrastructure providers that maintain independent certifications and compliance programs.
Transparency and updates
We may update this Security Statement as our products, infrastructure, or security practices evolve.
Material changes will be reflected by an updated “Last updated” date.
Contact
For security-related questions, access to our Data Processing Addendum (DPA), or requests regarding authorized sub-processors, please contact:
Email: security@zhadelabs.com
Website: https://zhadelabs.com