Security you can audit.

We love when your IT team asks questions. Here are the most common answers.

Two-factor authentication

Authenticator-app based. No SMS. Optionally enforced org-wide.

Audit log

Every mutation on candidate, application, offer is logged with timestamp + actor. Export on request.

Encryption

TLS 1.3 in transit. Encryption at rest on DB and backup volumes. Short-lived JWT.

Backups

Daily DB snapshotting. Point-in-time restore for any day in the last 30.

Hosted in Germany

No third-country transfer. DPA on request. No US-cloud dependency for candidate data.

Responsible disclosure

Report security issues to security@KI BMS. We respond within 24h and publish patches transparently.