Skip to main content

kayak-security-lock

Security at KAYAK
Our Commitment to Safety.

We use the NIST Cybersecurity Framework to guide our security program and have a 24/7 SOC team to monitor our systems. We prioritize transparency and conduct regular external audits to ensure robust protection and compliance.

Report vulnerabilities via HackerOne or at vulnerability-report@kayak.com

kayak-security-lock

Security at KAYAK
Our Commitment to Safety.

We use the NIST Cybersecurity Framework to guide our security program and have a 24/7 SOC team to monitor our systems. We prioritize transparency and conduct regular external audits to ensure robust protection and compliance.

Report vulnerabilities via HackerOne or at vulnerability-report@kayak.com

kayak-security-badge-gdpr
GDPR

kayak-security-badge-ccpa
CCPA

kayak-security-badge-dss
PCI DSS

kayak-security-badge-soc2
SOC 2 Type II

kayak-security-badge-sox
SOX

Infrastructure security.

Availability and Integrity Monitoring

Continuously tracks system performance and integrity to ensure service continuity.

kayak-security-checkmark

Network Firewalls & Segmentation

Uses firewalls and network segmentation to control and protect data traffic.

kayak-security-checkmark

Detection Tools

Implements advanced tools for real-time threat detection and response.

kayak-security-checkmark

Vulnerability Management

Regularly scans and addresses vulnerabilities to maintain system security.

kayak-security-checkmark

Security Information and Event Management (SIEM)

Collects, centralizes and analyzes security logs for effective threat management.

kayak-security-checkmark

Organizational security.

Dedicated Incident Response Team

A dedicated team to handle, investigate and solve security incidents.

kayak-security-checkmark

Yearly Third-Party Independent Audits

External and internal penetration tests are conducted annually by third-party audit firms.

kayak-security-checkmark

Yearly Mandatory Training

Annual training for all employees and additional role-specific training.

kayak-security-checkmark

Internal Risk Assessments

Regular assessments to identify and mitigate internal risks.

kayak-security-checkmark

Data security.

Separate PII and PCI environments

Dedicated environments for processing and storing PII and PCI data.

kayak-security-checkmark

Encryption at Rest & in Transit

Protects data both when stored and during transmission.

kayak-security-checkmark

Backups Enabled

Regular backups to ensure data recovery in case of loss.

kayak-security-checkmark

Access Monitoring

Continuous monitoring of data access to prevent unauthorized use.

kayak-security-checkmark

Standard Data Retention

Adheres to standard data retention policies with customizable options.

kayak-security-checkmark

Data privacy.

Data Lifecycle Policies

Policies to govern, amongst others, data handling, storage, retention and access.

kayak-security-checkmark

Data Privacy Officer

A dedicated officer to oversee privacy practices.

kayak-security-checkmark

Employee Privacy Training

Training programs to ensure employees understand privacy requirements.

kayak-security-checkmark

Exercise Data Privacy Rights

Mechanisms to answer data access requests, including but not limited to deletion and correction. See Privacy Policy.

kayak-security-checkmark

Record of Processing Activities

Detailed records of data processing activities.

kayak-security-checkmark

Global Privacy Compliance Program

Global Privacy Compliance Program to ensure our compliance with GDPR, CCPA, and all other data privacy compliance regulations we may be subject to.

kayak-security-checkmark

Application security.

Bug Bounty Program

Encourages external researchers to find and report vulnerabilities through our HackerOne Program.

kayak-security-checkmark

SAST and DAST Testing

Utilizes static and dynamic analysis to identify security issues.

kayak-security-checkmark

Open Source Vulnerability Management

Manages and mitigates vulnerabilities in open source components.

kayak-security-checkmark

Developer Training

Provides training to developers on secure coding practices.

kayak-security-checkmark

Endpoint security.

Disk Encryption

Encrypts data on disks to protect against unauthorized access.

kayak-security-checkmark

Endpoint Detection & Response (EDR)

Monitors and responds to threats on endpoints.

kayak-security-checkmark

Mobile Device Management

Manages and secures mobile devices accessing our systems.

kayak-security-checkmark

Device Posture Assessment

Evaluates device security status before granting access.

kayak-security-checkmark

Access control.

Multi-Factor Authentication (MFA) and SSO

Requires MFA and Single Sign-On for sensitive applications.

kayak-security-checkmark

Passwordless Authentication

Supports passwordless options to enhance security.

kayak-security-checkmark

Least Privilege

Grants the minimum level of access necessary for each user.

kayak-security-checkmark

Zero Trust Network Access

Adopts a zero trust model for secure network access.

kayak-security-checkmark

Logging and Monitoring

Maintains logs and monitors access for security oversight.

kayak-security-checkmark

Quarterly Access Reviews

Conducts reviews every quarter to ensure access controls remain effective.

kayak-security-checkmark