Security
We design for least‑privilege processing, optional isolation, and auditability.
Practices
- VPC and on‑prem options; single‑tenant by request
- Request‑level logging and export for audits
- PII redaction and customer‑managed keys (optional)
Certifications
We are preparing SOC‑2. Contact us for the latest status.