Application Security Measures

Centiloquy Application Security Measures

The Centiloquy core application employs the following measures to protect against bad actors and secure the platform for use in production.
The core application has also been pen tested for common web application vulnerabilities (e.g., OWASP Top 10 vulnerabilities such as cross-site scripting (XSS), SQL injection, broken authentication).

1. Application Security

Input Validation:

  • All APIs implement strict input validation to prevent common injection attacks such as SQL injection and XSS.

Authentication and Authorization:

  • The platform uses secure authentication mechanisms (OAuth 2.0, JWT tokens) with role-based access control (RBAC) to ensure that only authorized users can access specific workflows and data that belong to them.

Password Security:

  • User passwords and credentials are hashed using industry-standard algorithms (e.g., bcrypt & crypto JS) and never stored in plaintext when being saved to the database.

2. Data Security

Data Encryption:

  • All sensitive data is encrypted both at rest and in transit using strong encryption protocols (AES-256 for data at rest and TLS 1.2+ for data in transit).

Secure APIs:

  • All API endpoints are secured using HTTPS and are protected against common attacks such as brute-force attacks and DDoS.

2. Data Security

Data Encryption:

  • All sensitive data is encrypted both at rest and in transit using strong encryption protocols (AES-256 for data at rest and TLS 1.2+ for data in transit).

Secure APIs:

  • All API endpoints are secured using HTTPS and are protected against common attacks such as brute-force attacks and DDoS.

3. Container Security

Image Scanning:

  • Docker images can be scanned for known vulnerabilities using tools like Aqua Security or Clair. Only approved and scanned images are deployed to production environments.

Runtime Security:

  • Containers are run with restricted permissions (using Docker's --user flag) to minimize the attack surface.

Secrets Management:

  • Sensitive data such as API keys or database credentials are managed securely through environment variables using Docker Secrets or Kubernetes Secrets and are never hardcoded into the application.

4. Infrastructure Security

Network Segmentation:

  • When deployed in production, deployments should make use of network policies to isolate different services within the Docker/Kubernetes environment, ensuring that only necessary services can communicate with each other.

Firewall & IDS/IPS:

  • Firewalls and intrusion detection/prevention systems (IDS/IPS) should be used where possible to detect and prevent unauthorized access to our infrastructure.

Data Protection Compliance (GDPR)

Centiloquy complies with the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018.

We store only minimal cookies in the client to enable things like persistent sign in. Any data collected can be accessed, managed or deleted by the user. There are Admin APIs to delete accounts and all data associated with each account on demand when requested by the user.


Centiloquy implements measures to protect data from unauthorized access, including encryption and regular security audits.

Centiloquy delivers AI-powered, no-code automation solutions that streamline enterprise workflows. With 300+ integrations, real-time monitoring, and reusable templates, it empowers teams to work faster and smarter.
Its digital workers and industry-specific tools combine intelligent automation with human precision for impactful results.

Contact Us

+44 77235 77328
+1 (617) 297-9717

automation@centiloquy.com

StrategicERP UK Ltd.

128 City Road, London, EC1V 2NX

StrategicERP Inc.

399 Boylston St 6th Floor, Boston, MA 02116

@ All Rights Reserved 2025 StrategicERP UK Limited