Skip to content

Security by Design

Trust and security are fundamental to everything we build. Learn about our comprehensive approach to protecting critical infrastructure.

Our Security Framework

Zero Trust Architecture

Every connection, user, and device is verified before accessing critical systems. We implement multi-factor authentication, session monitoring, and just-in-time access controls.

End-to-End Encryption

All data in transit and at rest is encrypted using industry-standard algorithms. We maintain secure key management and regular rotation policies.

Compliance Standards

SUBNET adheres to the highest industry standards for critical infrastructure protection:

  • NERC CIP (Critical Infrastructure Protection) standards
  • IEC 62443 (Industrial Automation and Control Systems Security)
  • NIST Cybersecurity Framework
  • ISO 27001 Information Security Management
  • SOC 2 Type II compliance

Vulnerability Management

We maintain a comprehensive vulnerability management program including:

  • Regular security assessments and penetration testing
  • Automated vulnerability scanning and remediation
  • Responsible disclosure program for security researchers
  • 24/7 security monitoring and incident response

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:

Email: security@subnet.com

PGP Key: Available upon request

We commit to acknowledging reports within 24 hours and providing regular updates on remediation progress.

Questions About Security?

Contact our security team for more information about our practices and compliance.

Contact Security Team