Version
1.2
Security
/
Security Policy
Security Overview & Pilot Framework
Architecture, Data Boundaries, & Risk Controls
March 2026
SECURITY OVERVIEW
INFRASTRUCTURE
• Hosted on Heroku (AWS US-East) • Managed PostgreSQL • AWS S3 object storage
Primary Region: AWS US-East (N. Virginia)
ENCRYPTION
• Encryption at rest • TLS in transit • AES-256 S3 encryption
TENANT ISOLATION
• Logical tenant scoping • Cross-tenant access is restricted via tenant-scoped application logic.
AI BOUNDARY
• Retrieval-based architecture • Only relevant fragments sent to OpenAI • No training on customer data • Data submitted via OpenAI API is not used for model training (per provider policy)
SECURITY OVERVIEW
AUTHENTICATION & ACCESS
• Password + Google OAuth
• Role-based access control (RBAC)
LOGGING
• Application and platform logs
• Audit logging in development
CURRENT
SOC 2 not yet certified
ROADMAP
SOC 2 TYPE I → TYPE II
ARCHITECTURE & DATA BOUNDARIES
Internal Boundary Application + Tenant-Scoped Database Storage Boundary Encrypted S3 + Encrypted Postgres AI Boundary Fragment Retrieval + Stateless Model Invocation
PILOT OPERATING PARAMETERS
INTENDED MATERIALS
• CIMs
• Financial models
• Diligence reports
• IC preparation materials
DATA CLASSIFICATION
• May contain executive names and business contact information
• No PHI
• No PCI
• No consumer financial account data
• No production integrations
Pilot operates under confidential business information classification.
RISK CONTAINMENT FRAMEWORK
• Tenant-scoped logical isolation
• Role-based access control
• Fragment-based AI retrieval only
• No full repository transmission
• No automated outbound integrations
• Data deletion available upon request
• Pilot can be discontinued at any time
Operational security controls in place with structured compliance roadmap underway.