Security by ArchitectureSecurity by Architecture
Least Privilege
Role-scoped access everywhere. No broad keys. Temporary elevation only with approval.
Defense in Depth
Network, identity, data, and application controls layered to contain blast radius.
Provable Control
Every sensitive action produces evidence: who, what, when, why—exportable on demand.
Control Surface
- Identity & Auth. Passkeys, MFA, SCIM/SSO (SAML/OIDC), device checks for admin actions.
- Secrets & Keys. KMS-backed encryption, key rotation, per-environment isolation, no secrets in code.
- Data Security. AES-256 at rest, TLS in transit, RLS for tenant isolation, field-level controls for PII.
- Approval Gates. Co-approval required for mass send, data export, permission changes.
- Evidence & Logs. Immutable action logs with actor, scope, and result; retention policy configurable.
- Network Posture. IP allowlists, private networking / VPC peering options, egress controls.

Data Lifecycle
Collection
Consent-aware ingestion via APIs, webhooks, or uploads with scope-limited keys.
Processing
Transient memory, minimal retention by default, deterministic routing for PII.
Storage
Encrypted at rest, tenant isolation with RLS; optional customer-managed keys.
Deletion
Ticketed deletion workflows with evidence chain; backups pruned on schedule.
Compliance & Posture
Frameworks
- Controls mapped to SOC 2 / ISO 27001 families
- Data handling aligned with GDPR / CCPA principles
- TCPA/A2P practices for comms systems
Testing
- Regular penetration tests (external partner)
- Threat modeling & secure SDLC checks
- Automated dependency & supply-chain scans
Deployment Options
- Standard cloud with strict isolation
- Private VPC / peering
- Hybrid bridge for on-prem workloads
Documentation available under NDA: policies, DPIA template, subprocessors, and data flow diagrams.
Incident Response
We operate a measured, evidence-driven incident process with defined SLAs and customer communication protocols.
- 24/7 security contact for critical events
- Triage within 1 hour for high-severity incidents
- Customer notification based on regulatory thresholds & contracts
- Root-cause analysis and corrective actions shared post-incident
Shared Responsibility
Auctus Apex
- Platform security, logging, and access controls
- Encryption, key management, and network posture
- Incident response & vulnerability management
Customer
- User provisioning, SSO/SCIM configuration
- Data classification & least-privilege policies
- Approval workflows and retention settings