Security

Data Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3.

SOC 2 Type II

We are SOC 2 Type II compliant, ensuring the highest standards of security, availability, and confidentiality.

Access Controls

Role-based access control (RBAC) with granular permissions. All access is logged and audited.

Report a Vulnerability

Found a security issue? Email us at [email protected]