Security and Data Handling

Security and data handling

We prioritize trust by keeping controls lightweight, clear, and aligned with SOC 2 readiness expectations.

Security fundamentals

Authentication is handled by Clerk, and access to data is scoped by organization.

We apply role-limited access on the platform and monitor for unauthorized use.

Data handling

Assessment data is stored to deliver readiness insights and reports.

Shareable report links can be revoked to limit external access.

Privacy and minimization

We encourage teams to avoid entering sensitive secrets or credentials.

We provide controls to delete assessments or request account deletion.

Operational practices

We keep logs needed for platform reliability and abuse prevention.

Security practices evolve as we ship new features and respond to user feedback.

Next steps

Review our terms of use or privacy policy for details on platform usage and data handling.