NEURAL
FIREWALL.
Security Policy for Opsionic automation services. Real controls. Real boundaries. Clear responsibilities.
Last updated: April 19, 2026
01. Scope & Principles
This Security Policy describes how Opsionic protects systems used to deliver automation services and operate this website. It is designed to support confidentiality, integrity, and availability while minimizing unnecessary data exposure.
- Least-Privilege Access
- Defense-in-Depth
- EU Infrastructure (Finland)
- Secure-by-Default
This page is a security overview. Contractual details for client Processing are defined in the DPA and your project scope.
02. Infrastructure & Hosting
Opsionic operates on a private, secured server located in Finland (EU). Administrative access is restricted and monitored. Systems are maintained using secure configuration practices to reduce attack surface.
- Hardened Access Controls
- Monitoring & Security Logs
- Backup & Recovery
- Change Control
We avoid exposing internal network details publicly for security reasons. Detailed controls can be shared under NDA for enterprise procurement.
03. Encryption & Transmission
Data transmitted between systems is protected using industry-standard encrypted transport (TLS/SSL) where supported by the connected platforms. Where tokens/keys are required, we apply access minimization and secure handling practices.
- TLS/SSL in Transit
- Least-Privilege Tokens
- Secure Credential Handling
- Credential Rotation on Request
We do not promise a single encryption algorithm for every integration because third-party platforms differ. We implement the strongest supported option per platform.
04. Data Minimization & Retention
Opsionic designs automations to process the minimum data necessary to achieve the objective. We avoid storing client content unless storage is required for reliability, debugging, or explicitly requested features.
- Minimal Data by Design
- Limited Logs
- Deletion on Completion
- GDPR-Aligned Practices
Exact retention windows are defined in the Privacy Policy/DPA and may vary by project (e.g., security logs, support evidence, or legal-defense records). We avoid “guaranteed purge in X seconds” promises unless a specific architecture enforces it.
05. Monitoring & Incident Response
We monitor for suspicious activity signals (abnormal access patterns, repeated failures, unusual traffic). If a Security Incident is confirmed, Opsionic follows a structured response process: containment, investigation, remediation, and communication.
- Detection & Alerting
- Containment Procedures
- Root Cause Analysis
- Client Notification (DPA)
Breach notification timelines are defined in the DPA. We aim to inform clients quickly after verification, without delaying containment and evidence preservation.
06. Subprocessors & Tools
Opsionic uses a minimal set of external tools to run operations safely. For this website and communication: Brevo (email delivery) and Microsoft Clarity (usability analytics) may process limited data under their own security programs and contractual obligations.
- Vendor Minimization
- Contractual Controls
- Access Boundaries
- Change Notice via DPA
Full subprocessor terms and objection mechanism are documented in the DPA.
07. Client Responsibilities
Security is a shared model. You control the source systems and user permissions. To keep automations secure, clients must enforce strong access hygiene.
- Use 2FA Where Available
- Rotate Tokens Periodically
- Limit Admin Accounts
- Notify Us of Incidents
If you want, Opsionic can provide a “Client Security Checklist” for your internal team before go-live.
08. Vulnerability Disclosure
If you believe you found a security issue, report it responsibly and privately. Do not publicly disclose until we have a reasonable chance to investigate and mitigate.
- Email: security@opsionic.com
- Include Reproduction Steps
- Include Affected URLs/Systems
- No Social Media Disclosures
We do not operate a formal bug bounty program at this time. We do, however, treat verified reports seriously and prioritize remediation.
09. Limits of This Policy
This policy describes security intentions and operational practices. It does not create a guarantee that incidents will never occur. Security also depends on third-party platforms, client configurations, and external factors.
- No Overpromises
- Clear Boundaries
- Risk-Based Security
- Continuous Improvement
Contractual commitments (including incident notification and audit provisions) are defined in signed scopes and the DPA.