Security

Enterprise-grade security measures protecting your contract data with financial-level encryption and compliance standards.

Financial-Grade Security Infrastructure

Kenal Stamps employs financial-grade security measures to protect your sensitive contract data. Our platform is built with the same security standards used by banks and financial institutions.

  • Hosted on AWS Malaysia with enterprise-level infrastructure
  • Multi-layered security architecture with redundant protection systems
  • 24/7 security monitoring and threat detection
  • Regular penetration testing and vulnerability assessments

Regulatory Compliance

We maintain strict compliance with Malaysian regulatory standards and international best practices:

  • BNM RMIT Standards: Designed to meet Bank Negara Malaysia's Risk Management in Technology guidelines
  • PDPA Compliance: Full compliance with Malaysia's Personal Data Protection Act 2010 as a data processor
  • Malaysian Data Residency: All contract data processed and stored within Malaysian borders
  • Legal Framework Adherence: Compliance with Malaysian contract law and digital signature regulations

End-to-End Encryption

Your contract data is protected with military-grade encryption at every stage:

  • Data in Transit: All traffic between you and Kenal Stamps is encrypted using TLS 1.3
  • Internal Communications: All traffic between Kenal services is encrypted end-to-end
  • Data at Rest: All data, including contract files, are encrypted in the database using AES-256
  • Key Management: Advanced key rotation and management using AWS Key Management Service

Data Isolation and Privacy

We maintain strict data isolation to ensure your contract information remains completely private:

  • Customer Isolation: We do not share inputs or outputs between customers
  • AI Model Protection: We do not use inputs or outputs generated through our service to train our AI models
  • Access Controls: Role-based access controls with principle of least privilege
  • Audit Trails: Comprehensive logging of all data access and processing activities

Infrastructure Security

Our cloud infrastructure is designed with security-first principles:

  • AWS Malaysia Region: Data hosted exclusively in AWS Malaysia for regulatory compliance
  • Virtual Private Cloud: Isolated network environment with custom security groups
  • Multi-Factor Authentication: Required for all administrative access
  • DDoS Protection: Advanced protection against distributed denial-of-service attacks
  • Backup and Recovery: Encrypted backups with point-in-time recovery capabilities

Regular Security Audits

We conduct comprehensive security assessments to maintain the highest security standards:

  • Third-Party Audits: Independent security audits by certified security firms
  • Penetration Testing: Regular ethical hacking exercises to identify vulnerabilities
  • Code Security Reviews: Static and dynamic analysis of application code
  • Compliance Assessments: Regular reviews to ensure ongoing regulatory compliance
  • Vulnerability Management: Systematic identification and remediation of security issues

Employee Security

Our team is trained and vetted to maintain the highest security standards:

  • Background Checks: Comprehensive background verification for all employees
  • Security Training: Regular security awareness and training programs
  • Access Management: Strict access controls and regular access reviews
  • Confidentiality Agreements: Legal obligations to protect customer data
  • Secure Development: Security-focused development practices and code reviews

Business Continuity

We ensure service availability and data protection through comprehensive business continuity measures:

  • Disaster Recovery: Comprehensive disaster recovery plans with regular testing
  • High Availability: Multi-zone deployment for 99.9% uptime guarantee
  • Data Backup: Automated, encrypted backups with geographic distribution
  • Failover Systems: Automatic failover to ensure continuous service
  • Recovery Testing: Regular testing of backup and recovery procedures

Security Certifications

Our security practices are validated by industry-recognized certifications:

  • AWS Security Best Practices: Adherence to AWS Well-Architected Security Pillar
  • PDPA Compliance: Compliance with Malaysian data protection laws

Report Security Issues

If you discover a security vulnerability or have security concerns, please report them immediately to our security team at security@kenal.io. We take all security reports seriously and will respond promptly to investigate and address any issues.

Last updated: 8 December 2025