Interloom Security Overview

Security and trust for enterprise automation

Interloom is built for organizations that automate critical business processes and need strong, verifiable controls. This page gives security leadership and platform operations teams a practical view of our governance model, cloud architecture, and technical safeguards.

Microsoft Azure logo

Hosting and core platform

Microsoft Azure

Security controls align with Azure-native best practices, including isolation, encryption, and resilient storage.

TLS security icon AES security icon

Encryption baseline

AES-256 and TLS 1.2+

Data is protected in transit and at rest across storage, databases, and service communication paths.

ZITADEL logo

Identity model

Dedicated ZITADEL per customer

Isolated authentication infrastructure with SAML and OIDC support, plus secure fallback authentication options.

Built for security leadership due diligence and platform operations implementation

Interloom follows a defense-in-depth approach spanning policy, architecture, and operations. Our security program addresses governance expectations for compliance leaders and implementation requirements for engineering teams that run production workloads.

For security leadership teams

  • Security governance with clear ownership across CTO, Staff Engineering, and Product leadership.
  • Policy lifecycle with formal review, approval, versioning, and communication for major updates.
  • Control framework covering access, network, data, application, configuration, and incident response domains.
  • Certification roadmap in progress for ISO 27001:2022, ISO 42001, and TISAX.

For platform operations teams

  • Cloud-native architecture on Azure AKS with modular services and secure traffic management.
  • Network segmentation and customer-level isolation with dedicated VNets.
  • Encryption and secret management integrated across storage, databases, and key infrastructure.
  • Resilience strategy with backups, availability zones, and failover-ready infrastructure patterns.

Certification and assurance posture

Interloom is actively pursuing major security and AI governance certifications, with targeted completion in the next 6-9 months. The certification program reflects our commitment to transparent, auditable, and repeatable security practices.

Roadmap certifications

  • ISO 27001:2022 for a structured Information Security Management System (ISMS).
  • ISO 42001 for trustworthy AI lifecycle governance, risk management, and impact assessment.
  • TISAX for secure information handling, prototype protection, and GDPR-aligned controls.

Cloud assurance baseline

Interloom runs on Microsoft Azure, which provides a broad compliance foundation including certifications and independent assurance frameworks such as ISO 27001, HITRUST, FedRAMP, and SOC reporting. Azure infrastructure supports NIST SP 800-53 aligned control requirements and risk management models.

Security governance and accountability

Information Security Policies and Guidelines are developed and maintained by Interloom Staff Engineering in collaboration with Product and the CTO. Significant updates require CTO review and approval, followed by written internal communication to ensure organization-wide awareness and adherence.

Core security roles

  • Security leadership: CTO, Staff Engineers, and Head of Product.
  • Information users: employees, contractors, vendors, and approved visitors with system access.
  • Managers: responsible for operational compliance within their teams.
  • Engineering and product staff: implementation and maintenance of technical safeguards.
  • Security team function: policy enforcement, assessments, and incident response coordination.

Technical controls in Azure

Azure operates under a shared responsibility model: Microsoft secures the cloud platform, while Interloom secures workloads, configurations, identities, and customer environments within Azure.

Workload and network architecture

  • Azure Kubernetes Service (AKS): container orchestration for modular microservices.
  • Dedicated Virtual Networks: each customer environment is isolated to reduce cross-tenant risk.
  • Azure Application Gateway: controlled application traffic routing with TLS termination capabilities.
  • Restricted internet exposure: only essential web ports are exposed where required (80 and 443).

Data protection controls

  • Data in transit: TLS 1.2+ and HTTPS enforcement for service communication.
  • Data at rest: AES-256 encryption for storage and Transparent Data Encryption (TDE) for databases.
  • Backup encryption: encrypted backup sets across protected storage layers.
  • Key and secret management: Azure Key Vault for certificates, secrets, and cryptographic keys.
  • Optional customer-managed keys: additional encryption control via CMK integrations.

Identity and access management

Interloom integrates dedicated ZITADEL instances per customer for identity and authentication, enabling strict tenant isolation and enterprise SSO compatibility.

  • Supports integration with existing SAML and OIDC identity providers.
  • Provides built-in authentication for organizations without an existing IdP.
  • Uses role-based access principles and least privilege access patterns.
  • Applies multi-factor authentication for management interfaces and privileged access paths.
  • Authenticates inbound requests before workloads are reached.

Data separation and tenant isolation

Interloom supports single-tenant hosting for organizations that require strict isolation boundaries. Dedicated customer instances are deployed with isolated infrastructure resources to maximize security, performance, and compliance confidence.

  • Dedicated Kubernetes-based deployment model per single-tenant environment.
  • Segregated network resources and configuration domains.
  • No shared runtime overlap for isolated deployments.

Disaster recovery and operational resilience

Interloom uses Azure-native resilience patterns to minimize downtime and support business continuity requirements across critical operations.

  • Zone-redundant storage: multiple copies across physical locations within a region.
  • Automated backups: scheduled backup workflows for databases and critical application states.
  • High availability: availability zones and region failover design patterns.
  • Containerized resilience: load balancing and distributed workloads reduce single points of failure.
  • Flexible redundancy options: support for LRS, ZRS, GRS, and RA-GRS based on customer requirements.

Control domains implemented by Interloom

Our security framework includes administrative, technical, and operational controls designed to align with enterprise risk management and compliance needs:

  • Access controls (role-based access, least privilege).
  • Network controls (firewalls, intrusion detection and prevention patterns).
  • Data controls (encryption and data loss prevention strategies).
  • Application controls (input validation, code review, secure development practices).
  • Configuration controls (hardening, vulnerability scanning, baseline management).
  • Identity and access controls (MFA, privileged access management).
  • Incident response and disaster recovery procedures.
  • Physical and environmental controls via cloud provider security infrastructure.

Security engagement for enterprise customers

Need a deeper technical or compliance review? We support structured security assessments, architecture walkthroughs, and procurement due diligence with your security leadership and platform operations stakeholders.

Interloom Technologies GmbH

Osterwaldstr. 10, 80805 Munich, Germany

Email: contact@interloom.com

Managing Director: Fabian Jakobi | Amtsgericht Muenchen, HRB 287622