Security
We operate with a trust-first security model so hiring activity remains reliable and accountable.
Security overview
Multiple independent controls secure identity, data, and platform trust states.
TLS 1.3 in transit, AES-256 encryption at rest, and strict secret management.
MFA-ready login flows, device/session controls, and anomaly detection.
Document checks, biometric checks, and ongoing integrity validation.
Behavioral risk scoring and policy enforcement prevent spam and impersonation.
Security architecture
Validation, risk scoring, storage, and response are separated by design.
Identity checks and role metadata are validated before any trust score is surfaced.
Signals are normalized into trust graphs and continuously refreshed to prevent drift.
Alerts, escalation playbooks, and audit trails activate when risk thresholds are crossed.
Encrypted storage and transport
Hardened secrets and access control
Continuous abuse monitoring
Incident response
We follow documented escalation steps for containment and transparent communication.
Signals are monitored continuously with automated and manual review triggers.
Suspicious sessions are revoked, roles locked, and access isolated.
Investigation, user communication, and documented remediations complete the cycle.
Responsible disclosure
Coordinated disclosure is preferred. Report issues at security@vervi.in.
If you discover a security issue, email security@vervi.in with reproducible steps.
We provide acknowledgement within 48 hours and work with the reporter through verification and remediation.
Contact security channel