Skip to main content

Security

Kuroco is built to be cloud-native and designed with security in mind.

API

  • Fully encrypted HTTPS communication
  • TLS certificate
  • Custom domain settings
  • Web Application Firewall (WAF)
  • CDN
  • DDoS protection
  • Access control through fixed tokens, dynamic tokens, and/or cookies
  • Flexible CORS configuration
  • Strict permissions control via user group settings
  • IP address access restrictions
  • Access logs (audit logs)
  • Application logs
  • External login integration via SAML/OAuth

Management screen

  • Fully encrypted HTTPS communication
  • TLS certificate
  • Web Application Firewall (WAF)
  • DDoS protection
  • Access restriction by ID & password
  • Strict permissions control via user group settings
  • IP address access restrictions
  • Encrypted token storage function
  • Access logs (audit logs)
  • Application logs
  • Configuration of two-factor authentication by SMS and authentication apps
  • External login integration via SAML/OAuth

KurocoFront

  • Fully encrypted HTTPS communication
  • TLS certificate
  • Custom domain settings
  • CDN
  • DDoS protection
  • BASIC authorization
  • IP address access restrictions
  • Access logs

KurocoFiles

  • Fully encrypted HTTPS communication
  • TLS certificate
  • CDN
  • DDoS protection
  • Strict permissions control via user group settings
  • IP address access restrictions
  • Access logs

※In addition to KurocoFiles, it is possible to restrict access to files based on user authentication using Google Cloud Storage and Amazon S3.

Data centre

You can choose which data centre to use when you start using the service.

  • Google Cloud Platform Tokyo Region
  • Google Cloud Platform EU Region
  • Google Cloud Platform US Region

Managing company (Diverta Inc.)

Vulnerability assessment

  • Vulnerability scan for containers at every container update (almost daily)
  • Implementation of vulnerability assessment using VADDY (for the standard APIs of the respresentative site)
  • Vulnerability diagnosis of customized API at customer sites through automatic integration with VADDY (*Automatic integration is available upon request via the management screen)
  • Free customer support related to Kuroco-derived vulnerabilities identified in individual vulnerability assessments

Checklist

The following security checklist is available and can be provided for Kuroco services. If you wish to receive them, please contact us via our support team.

  • "Security Implementation Checklist" supervised by Information-technology Promotion Agency, Japan (IPA)
  • "SLA Guidelines for SaaS (Kuroco version)" published by the Ministry of Economy, Trade and Industry (METI).

Security Evaluation Platform

Documents


Support

If you have any other questions, please contact us or check out Our Slack Community.