← PROSPECTSENTINEL
SECURITY

How we protect your data.

A complete posture summary — infrastructure, encryption, access controls, backups, vulnerability management, and incident response. Use this page to answer vendor security questionnaires (SIG, CAIQ) or as a starting point for a one-page security review.

Infrastructure

Application hostingVercel (United States) — Next.js 15 runtime on serverless edge.
Database + storageSupabase (United States) — managed Postgres with workspace-scoped Row-Level Security on every tenant table.
AI processingAnthropic Claude (United States) — customer data not used to train models per Anthropic's API terms.
Background workersRailway (United States) — signals worker + PACA enrichment as scheduled Python jobs.
PaymentsStripe (United States) — PCI-DSS Level 1 service provider. Card data never touches our infrastructure.
ObservabilitySentry (United States) — error tracking. PII-scrubbed by default in our configuration.
EmailResend (United States) — transactional email only. No marketing list scraping.

Encryption

In transitTLS 1.2+ on all customer-facing endpoints. HSTS enforced by Vercel.
At restAES-256 at the database layer (Supabase managed). Storage buckets encrypted at rest.
BackupsEncrypted at rest with the same provider-managed keys.
SecretsStored in Vercel Environment Variables (encrypted at rest), never committed to the repo. Per-environment scoping.
API tokensSHA-256-hashed before persistence. Cleartext shown once at creation.

Access controls

Workspace isolationRow-Level Security on every tenant table. Workspace_id scoping verified by Supabase Auth — cross-workspace reads are impossible at the database layer.
Role hierarchyOwner / Manager / Rep / Viewer. Enforced both in RLS policies AND at the route handler layer.
Audit logEvery create/update/delete on tenant tables logged with actor, timestamp, before/after JSON. 90-day default retention (workspace-configurable up to 10 years).
Personnel accessLeast-privilege; documented justification required for production access. Service-role key rotated on personnel changes per SECRETS_ROTATION.md.
SSO supportSAML 2.0 with Okta, Entra ID, Google Workspace, OneLogin, generic SAML. Per-workspace email-domain routing.
2FASupabase Auth supports 2FA at the user level (TOTP). Enforced workspace-wide via Pro tier.

Data handling

Customer data ownershipCustomer retains ownership at all times. We process only to provide the service.
Data residencyUnited States today. EU/UK residency available on Enterprise plan via Supabase region selection.
Data exportSelf-serve export available 30 days post-cancellation. CSV via admin UI; full JSON via API.
Retention after termination30-day window for export. Production rows permanently deleted thereafter. Backups age out per the rotation schedule (7-30 days).
Sub-processorsListed publicly in our DPA. 30-day notice before adding or replacing a sub-processor.
AI training opt-outCustomer data never used to train AI models. Anthropic's API terms explicitly prohibit this.

Vulnerability management

Dependency scanningAutomated via npm audit + GitHub Dependabot. Critical CVEs addressed within 7 days; high within 30.
Source codePrivate GitHub repository with branch protection on main + required PR review.
Security testingInternal pre-release review on every change. Third-party penetration testing planned ahead of SOC 2 Type II.
DisclosureResponsible-disclosure email at security@example.com. Bug bounty program planned.

Incident response

DetectionSentry monitors application errors + performance. /api/healthz exposes env-presence checks for external uptime monitors.
NotificationCustomers notified within 72 hours of confirmed personal-data breach affecting their workspace. Includes nature, scope, mitigation per our DPA Section 7.
DR / RTO / RPODocumented in BACKUP_RECOVERY.md. RTO ~30 min on the happy path (DB restore + Vercel rollback); RPO 24 hours on free tier, 1 minute on Supabase Pro (PITR).
Quarterly drillDR restore tested against a disposable Supabase project. Latest drill date logged in BACKUP_RECOVERY.md.

Compliance

SOC 2Not yet certified. Type II audit planned in [TIMELINE]. Vendor questionnaire available on request.
GDPRDPA available at /dpa. Standard Contractual Clauses for EU/UK transfers.
CCPAPrivacy Policy describes consumer rights at /privacy.
HIPAANot in scope today — no PHI processing.
PCI-DSSOut of scope — Stripe is our PCI-compliant payment processor; card data never touches our systems.

Reporting a vulnerability

We welcome responsible disclosure. If you've found a security issue:

  1. Email security@example.com with reproduction steps + impact.
  2. Don't publicly disclose until we've had time to fix and notify affected customers (typically 90 days).
  3. We'll acknowledge within 2 business days and keep you updated on remediation.

Requesting documentation

For enterprise reviews, we provide on request:

  • Vendor security questionnaire response (SIG / CAIQ / custom)
  • DPA (Data Processing Agreement) — also public at /dpa
  • Disaster recovery + business continuity narrative
  • Sub-processor list
  • Penetration testing summary (when complete)
  • SOC 2 Type II report (when complete)

Email security@example.com with your request.