Encryption & Data protection
Your data is encrypted at rest and in transit. Keys are rotated and access is role-scoped with least-privilege. Backups are encrypted and tested.
We protect your data with modern encryption, strict access controls, and monitored infrastructure. Below is a concise view of how we secure and operate your environment.
Your data is encrypted at rest and in transit. Keys are rotated and access is role-scoped with least-privilege. Backups are encrypted and tested.
We are progressing toward SOC 2 Type I. Our controls map to leading frameworks and are reviewed on a regular cadence.
We do not sell personal data. We honor GDPR and CCPA requests and limit data collection to what’s necessary to deliver service.
Multi‑AZ deployment with automated failover and continuous monitoring. Incident response drills and postmortems drive improvements.
All admin access is SSO enforced with MFA. Administrative actions are logged and reviewed.
We publish status and planned maintenance. You can request a copy of our security overview at any time.