Control runs
SSO · KMS · backups
TRUST · OVERVIEW
Certifications you can verify, controls you can audit, regions you can pin to. Every claim on this page maps to an artefact you can receive under NDA.
TRUST · CERTIFICATIONS
We pre-publish what auditors, legal, and security teams always ask for. The real artefacts — SOC 2 report, pen-test summary, DPA — are one NDA away.
TRUST · CONTROL MATRIX
Every byte is encrypted at rest with envelope encryption. All transit, including inside our VPC, uses TLS 1.3.
Customer-managed keys in AWS KMS are supported on enterprise plans. Keys never leave your region of choice.
SSO is available on every paid plan. SCIM provisions users and groups from your IdP in real time.
Every action resolves against the same policy engine — users, service accounts, SDK tokens. No shadow admin.
Every write is stamped into an append-only audit log with actor, intent, payload diff, and trace ID.
Databases run multi-AZ with streaming replication. Snapshots every hour, retained 30 days, restorable to any point.
Dependencies and infra images are scanned on every build. Third-party pen tests run twice a year; reports on request.
Standard DPA available. Every subprocessor is listed publicly with the data they touch and why.
TRUST · DATA RESIDENCY
TRUST · AUDIT LOG
TRUST · HOW EVIDENCE IS PRODUCED
Our controls emit evidence into the memory bus exactly like any other event. Auditors read from a typed, append-only log — we do not hand-compile screenshots.
SSO · KMS · backups
typed · signed
append-only
quarterly · on-demand
SOC 2 · ISO
TRUST · AUDIT SCHEMA
An append-only record of a single security-relevant action.
A signed, versioned collection of evidence covering a control window.
PLATFORM · CLOSE THE LOOP
We treat security, residency and privacy as first-class features, not retrofits. Request the full evidence pack — SOC 2, pen-test summary, DPA and subprocessor ledger.