How we protect your payroll data with bank-grade security measures
Kore Payroll is designed with security as a foundational principle, not an afterthought. We apply a defence-in-depth approach, combining multiple layers of technical controls with rigorous operational security practices. We are ISO 27001-aligned and work towards formal certification.
We hold ourselves to the security standards expected by the most regulated industries โ because payroll data demands nothing less.
All data stored in our databases and file storage is encrypted using AES-256 โ the same standard used by banks and government agencies.
Every connection to Kore Payroll is encrypted using TLS 1.3. We do not support TLS 1.0 or 1.1. HSTS headers enforce HTTPS-only connections.
Your data is stored exclusively in UK data centres (AWS eu-west-2, London). We contractually guarantee your data never leaves UK jurisdiction.
MFA is available for all users and can be enforced platform-wide by administrators. We support TOTP authenticator apps.
Granular permissions ensure each user can only access data appropriate to their role. Principle of least privilege applied throughout.
Every data access and modification is logged in an immutable audit trail. Logs cannot be modified or deleted, even by administrators.
Cloud hosting: The Service runs on Amazon Web Services (AWS) UK region (eu-west-2). AWS operates ISO 27001-certified, SOC 2 Type II-audited data centres with multi-layer physical security, including biometric access, CCTV surveillance, and 24/7 security personnel.
Network security: Our infrastructure is protected by:
Availability: The Service is designed for high availability with redundant infrastructure across multiple availability zones. We target 99.9% uptime (with SLA guarantees for Pro customers) and maintain a business continuity plan with tested failover procedures.
Secure development: We follow OWASP Secure Coding Guidelines throughout our development lifecycle. Security requirements are built into every feature from design through deployment.
Authentication:
API security: All API endpoints require authentication. Rate limiting prevents abuse. API keys can be revoked instantly. OAuth 2.0 used for third-party integrations.
Input validation: All user input is validated and sanitised. SQL injection, XSS, and CSRF protections are implemented throughout.
Dependency security: We regularly scan our software dependencies for known vulnerabilities using automated tools and apply security patches promptly.
Employee security:
Change management: All changes to the production environment are subject to code review, automated testing, and documented deployment procedures. Emergency changes follow an accelerated but equally rigorous process.
Penetration testing: We commission annual penetration tests from CREST-accredited security firms. Pro customers may request summary test reports under NDA.
Backups: Data is backed up daily with automated, encrypted backups retained for 35 days. Backup restoration is tested quarterly.
Data separation: Customer data is logically separated by tenant ID at the database level. No customer can access another customer's data.
Data minimisation: We collect and process only the personal data necessary for the Service. We conduct regular data minimisation reviews.
Secure deletion: When data is deleted (including on account closure), it is securely overwritten in accordance with NIST SP 800-88 guidelines.
We maintain a documented Incident Response Plan that covers:
In the event of a confirmed personal data breach affecting your data, we will notify you within 72 hours in accordance with our Data Processing Agreement.
All third-party service providers with access to personal data are subject to:
Our current sub-processors are listed in Annex B of our DPA.
We welcome reports from security researchers who discover vulnerabilities in our Service. If you find a security issue, please:
We commit to: acknowledging receipt within 2 business days, providing a remediation timeline within 14 days, and not pursuing legal action against good-faith researchers who follow this process.
For security questions, concerns, or to report a vulnerability: security@korepayroll.co.uk
For Pro customers requesting security documentation, penetration test summaries, or security questionnaire support: enterprise@korepayroll.co.uk
Related: Privacy Policy ยท Data Processing Agreement ยท Acceptable Use Policy