Security Controls
Aligned with industry best practices
Your data is encrypted, isolated, and protected by industry-leading security standards.
Aligned with industry best practices
Data encrypted at rest and in transit
Multi-AZ deployment with auto-failover
TLS 1.3 encrypted
WAF + Rate limiting
Secure key storage
AES-256 encrypted
All stored data is encrypted using AES-256 encryption. Database fields containing sensitive information use additional field-level encryption.
All API communications use TLS 1.3 with strong cipher suites. We enforce HSTS and support certificate pinning for mobile apps.
Signing keys are securely stored with encryption at rest. Key access is strictly controlled with audit logging for all operations.
Define granular permissions for team members. Separate roles for signing, verification, and administration.
Enterprise plans include SSO integration with your identity provider for centralized authentication.
We'll send our security controls documentation, penetration test summary, and architecture overview within 24 hours.
Request security pack