Enterprise-grade security documentation for vendor risk assessments and procurement teams. Download what you need or grab the whole pack as a ZIP.
Five PDFs covering security architecture, data processing, AI governance, SOC 2 readiness, and a pre-completed vendor risk assessment. Download individually or grab the full pack above.
Every layer is testable, auditable, and reflected in the documents above. The dashboard's Security page surfaces the live status for compliance auditors.
AES-256 at rest. TLS 1.3 in transit (Cloudflare edge). Per-OAuth-token Fernet keys. JWT HS256 with 15-minute access tokens.
Read full documentation → 🛡Three layers — JWT-derived org_id on every query, PostgreSQL Row-Level Security policies on the nine tenant-scoped tables, and dedicated infrastructure for Enterprise.
Read full documentation → 👁Immutable append-only SOC 2 log enforced by a database trigger (no UPDATE, no DELETE). Queryable + exportable API. 7-year retention target.
Read full documentation → 🎭Five built-in roles, 40+ wildcard-aware permissions, brand-level scoping for agencies, and per-user permission overrides. Custom roles on Enterprise.
Read full documentation → 🤖Human-approval gates on every published piece of content. No customer data is used for model training. PII redaction on logging boundaries.
Read full documentation → 🔄Four severity levels with defined response times. Kill switches on every autonomous component. Operator access via encrypted VPN tunnel only; every entry logged.
Read full documentation →We don't claim certifications we don't hold. Here's the honest roadmap.
org_id that's derived from your JWT — never from client input. (2) Database: PostgreSQL Row-Level Security policies on every tenant-scoped table provide defense-in-depth. (3) Infrastructure: dedicated database schemas / instances are available for Enterprise customers. Live proof is exposed via the in-app /security/isolation-proof endpoint.