Security Built Into Every Layer
Your compliance data is among the most sensitive information your firm handles. We protect it with the same rigor you apply to your regulatory obligations.
AES-256
Encryption at rest
TLS
Encryption in transit
RBAC
8 granular access roles
Data Encryption
- AES-256 encryption for all data at rest via Google Cloud managed encryption
- TLS encryption (1.2/1.3) for all data in transit
- Database connections encrypted with SSL certificates
- Encrypted backups via Cloud SQL automated backup system
Access Controls
- Role-based access control (RBAC) with 8 granular permission levels
- Per-tenant data isolation — firm data is never shared across organizations
- JWT-based authentication with secure token refresh
- Password hashing with bcrypt and configurable complexity requirements
- SSO/SAML integration available on Enterprise plans
Infrastructure
- Hosted on Google Cloud Platform (GCP) with Cloud Run
- Cloud SQL (PostgreSQL 16) with automated failover and backups
- All data stored in US-based data centers
- Auto-scaling infrastructure with built-in redundancy
- Redis-backed session caching via Memorystore
Audit Logging
- Every user action logged with timestamp, user ID, and IP address
- Audit logs scoped per tenant and exportable for exam preparation
- Searchable and filterable audit trail for compliance officers
- Persistent log storage for regulatory compliance
Session Management
- Configurable session timeout with automatic expiration
- Secure session token handling with automatic expiration and blacklisting
- Automatic token refresh with sliding window expiration
- Configurable session timeout policies
Data Handling
- Multi-tenant architecture with strict tenant-scoped database queries
- Data export capabilities for portability and regulatory compliance
- File uploads stored securely in Google Cloud Storage with access controls
- Persistent data storage with tenant-scoped isolation
Have Security Questions?
We welcome security inquiries from prospective and current customers. Our team is happy to discuss our security posture, provide documentation, or complete your vendor security assessment questionnaire.
Contact Our Security TeamReady to transform your compliance workflow?
Be among the first to experience AI-powered compliance technology.