Security and Data Handling
Security and data handling
We prioritize trust by keeping controls lightweight, clear, and aligned with SOC 2 readiness expectations.
Security fundamentals
Authentication is handled by Clerk, and access to data is scoped by organization.
We apply role-limited access on the platform and monitor for unauthorized use.
Data handling
Assessment data is stored to deliver readiness insights and reports.
Shareable report links can be revoked to limit external access.
Privacy and minimization
We encourage teams to avoid entering sensitive secrets or credentials.
We provide controls to delete assessments or request account deletion.
Operational practices
We keep logs needed for platform reliability and abuse prevention.
Security practices evolve as we ship new features and respond to user feedback.
Next steps
Review our terms of use or privacy policy for details on platform usage and data handling.