Security
Last updated: March 25, 2026
Security Principles
- Least-privilege access for internal operations
- Segmented infrastructure for operational isolation
- Controlled credential handling and access review
- Continuous improvement based on incident learnings
Account and Access Controls
ColdMail is designed around clear account ownership and controlled access. Where applicable, role-based access patterns are used to limit operational risk.
Infrastructure Hardening
- Baseline hardening for production environments
- Authentication and transport security best practices
- Monitoring workflows for operational anomalies
Data Handling
We follow data minimization and operational-need principles when handling account and support data.
Incident Response
If we detect a security event affecting customer operations, we investigate, contain, and communicate material updates through our support channels.
Contact
For security questions, contact: support@coldmail.app