Trust · Security
Security posture.
Our engineering, operational, and infrastructure controls, in the open.
Transport & HTTP
- TLS 1.3 only, HSTS preload enabled.
- Strict Content-Security-Policy with nonce-based script controls.
- X-Content-Type-Options: nosniff, X-Frame-Options: DENY.
- Referrer-Policy: strict-origin-when-cross-origin.
- Permissions-Policy restricts camera, microphone, geolocation, FLoC.
- Subresource Integrity (SRI) for third-party assets.
Authentication
- Clerk for customer auth with MFA enforced.
- SSO (SAML / OIDC) for enterprise tenants.
- Hardware keys (WebAuthn) required for operator accounts.
- Session rotation on privilege change.
Data handling
- Customer data encrypted at rest (AES-256) and in transit (TLS 1.3).
- Per-engagement tenant isolation.
- Retention: findings purged 90 days after engagement close (configurable).
- No production data used in development environments.
SDLC & operations
- All changes behind peer review + signed commits.
- SAST (Semgrep, CodeQL), SCA (Snyk, Dependabot), IaC scanning (Checkov, tfsec).
- Secret scanning (gitleaks) in CI + pre-commit.
- Threat models updated per release for every high-risk system.
- Annual third-party penetration test.
Infrastructure
- Marketing site on Vercel with automatic DDoS protection.
- Application infrastructure on AWS, multi-AZ, least-privilege IAM.
- Centralized logging with tamper-evident storage.
- 24/7 pager rotation for security-critical alerts.
