Zithara Security

security-img

Zithara.AI is pursuing ISO 27001:2022 certification and follows ISO 27001 controls across our information security management system.

We apply these controls across the entirety of Zithara.AI's offerings, including its products, cloud services, IT infrastructure, administrative functions, finance, and internal operations.

At Zithara.AI, we recognize that safeguarding your data is our paramount obligation. We have established comprehensive organizational processes across all business functions to uphold our commitment to data security. The subsequent sections will provide a more in-depth overview of the systems we have implemented.

Physical Security

The Zithara.AI development center located in Hyderabad is secured with 24/7 physical protection. Access to the building and offices is restricted to authorized personnel only. Employees are permitted entry to the office following biometric authentication. Sensitive areas within the office are accessible solely to authorized individuals. Important documents are stored in secure cabinets, accessible only to designated personnel. The premises are monitored by surveillance cameras, with footage regularly reviewed by authorized staff. A policy is in place to manage and control visitor access to the facility. The office benefits from a continuous power supply, supported by an alternative uninterrupted power supply system to maintain operations during power outages. Zithara.AI's applications and data are hosted on Amazon Web Services, which has undergone rigorous security, availability, and business continuity assessments. For further information, please consult the AWS Security Whitepaper.

Application Security

All Zithara.AI applications and services are hosted on Amazon Web Services across various regions. The infrastructure for databases and application servers is managed and maintained by the cloud service providers. At Zithara.AI, we adopt a holistic approach to application security, ensuring that every aspect from engineering to deployment, including architecture, is thoroughly addressed.

Application Architecture

The application is initially safeguarded by AWS’s firewall, which is designed to mitigate standard DDoS attacks and other network-related threats. The subsequent layer of defense is a web application firewall (WAF) that actively monitors for malicious IP addresses, users, and spam activities. Access to the application is restricted to users with valid credentials; however, it is important to recognize that security in cloud-based solutions is a shared responsibility between the service provider and the businesses utilizing those cloud accounts. Our products facilitate administrators in enforcing industry-standard password policies and include features specifically aimed at protecting business data in the cloud:

Role based access

Sales Groups

Permission Templates

IP Whitelisting for exclusive access

Zithara.AI employs a multi-tenant data architecture to host all its applications. Each client is allocated a distinct database, ensuring that the system retrieves data exclusively associated with the logged-in tenant. Consequently, no client can access another client’s data. Access to the application by the Zithara.AI development team is also strictly controlled, managed, and subject to auditing. All-access to the application and its infrastructure is logged for future audits.

AI Security

As an AI-first CRM platform, we apply dedicated security controls to all AI-powered features including WhatsApp chat agents, customer segmentation, campaign automation, and lead scoring.

Tenant Isolation: AI processing is strictly isolated per merchant. Each merchant's data is processed within their own database boundary. No cross-tenant data mixing occurs during AI inference.

Model Access Controls: Access to AI models and training data is restricted to authorized engineering personnel through role-based access controls with multi-factor authentication.

Prompt Injection Defense: WhatsApp chat agents include guardrails against prompt injection attacks, with input validation and output filtering on all AI-generated responses.

Audit Logging: All AI inference requests are logged with timestamps, data types accessed, merchant ID, and purpose codes. Logs are retained for compliance auditing.

No Third-Party Training: Merchant customer data is never shared with or used to train external AI models. We maintain strict data processing agreements with all AI service providers.

Human Escalation: AI chat agents include configurable rules for escalating conversations to human support when confidence is low or topics are sensitive.

For more details on our AI governance principles, visit our AI Governance page.

Application Engineering and Development

We adhere to a secure software development lifecycle, wherein security testing is integrated into the development, testing, and pre-release acceptance phases. A security review is an essential component of the application engineering process at Zithara.AI.

Software Changes and Release Management

Modifications in our production environment are executed through a meticulously defined and systematic process, transitioning from development and testing environments to final verification on staging prior to production deployment. Production deployments are exclusively carried out by authorized members of the DevOps team, with no other personnel granted access to our production environment.

Production Monitoring

Our dedicated Network Operations Center (NOC) team operates around the clock to oversee the application for any suspicious activities or potential attacks. We also engage in regular external audits conducted by third parties to validate the security status of our applications and services.

Data Security

Zithara.AI prioritizes the safeguarding and security of its customers' data. The company oversees the security of its applications and the data of its clients. The development team at Zithara.AI does not have access to data stored on production servers. All modifications to the application, infrastructure, web content, and deployment processes are meticulously documented as part of an internal change control protocol. The integrity and protection of customer data are of utmost importance to Zithara.AI. Data at rest is secured through AES-256-bit encryption (key strength – 1024), with key management handled by AWS Key Management Service. Additionally, all data in transit is encrypted using FIPS-140-2 standard encryption over a secure socket connection for all accounts hosted with us. Distinct environments are utilized for development and testing, with access to systems strictly controlled based on the principles of need-to-know and appropriate information classification, incorporating Segregation of Duties, which is reviewed quarterly.

Data Deletion

Upon the termination of your account with us, we ensure that your data is handled in accordance with our data retention policies. Further details can be found in our terms of service.

Network Security

The network at Zithara.AI's office, where updates are developed, deployed, monitored, and managed, is fortified with industry-standard firewalls and antivirus solutions. This infrastructure is designed to safeguard internal information systems against unauthorized access and to deliver real-time alerts in the event of a security threat or incident. Firewall logs are systematically archived and reviewed on a regular basis. Access to the production environment is facilitated through SSH, with remote access strictly limited to the office network. Audit logs are generated for every remote user session and are subject to review. Furthermore, access to production systems is consistently secured through a multi-factor authentication process. Our data centers, hosted on AWS, comply with ISO 27001, SSAE-16, and HIPAA standards.

Compliance & Regulatory

Zithara.AI maintains compliance with the following standards and regulations:

ISO 27001: Information security management system — we follow ISO 27001 controls across our ISMS

DPDPA 2023: India's Digital Personal Data Protection Act — we comply with data principal rights, data fiduciary obligations, and breach notification requirements

AWS Compliance: Our infrastructure on AWS (Mumbai region) inherits AWS's ISO 27001, SOC 1/2/3, and HIPAA compliance

OWASP Top 10 for LLM: We follow OWASP's security guidelines specific to large language model applications

Compliance roadmap: SOC 2 Type I (Planned for Q3 2026), ISO 27001:2022 upgrade (In progress), DPDPA Data Protection Impact Assessment (Completed).

Reporting issues and threats

At Zithara.AI, we prioritize the security of our customers' data. Should you identify any issues or vulnerabilities that may affect the data security or privacy of Zithara.AI users, we encourage you to contact our Security team with the pertinent details so that we can address the matter promptly. We request that you refrain from disclosing or publicizing any unresolved vulnerabilities to third parties. Upon submission of a vulnerability report, the Zithara.AI security team, along with the relevant development teams, will make reasonable efforts to:

Acknowledge receipt of your vulnerability report in a timely manner.

Investigate the reported issue and provide an estimated timeline for remediation. We may seek your assistance in identifying or replicating the issue and understanding potential solutions to mitigate the threat immediately.

Inform you once the vulnerability has been resolved.

We greatly value your assistance in identifying and rectifying issues within our platform, and we will recognize your contributions to the community once the threat has been addressed. For AI-specific security concerns, contact us at security@zithara.in with 'AI Security' in the subject line. Public Disclosure Policy By default, this program operates under a “PUBLIC NONDISCLOSURE” policy, which stipulates: “THIS PROGRAM PROHIBITS PUBLIC DISCLOSURE. ANY INFORMATION REGARDING VULNERABILITIES DISCOVERED IN THIS PROGRAM MUST NOT BE RELEASED TO THE PUBLIC; FAILURE TO COMPLY MAY RESULT IN LEGAL CONSEQUENCES!” The Fine Print We reserve the right to amend the terms of this program or to discontinue it at any time. Any modifications made to these program terms will not be applied retroactively. Employees of Zithara.AI and their family members are ineligible for bounties.