Security
Production AI under real-world security constraints.
What we do to keep your data, your code, and your AI infrastructure safe. This page is the honest version — what's actually in place, what's in progress, and where the boundaries are.
Our principles
Least privilege by default
Engineers get access scoped to the engagement, not the org. Production secrets stay in your accounts. We never need superuser access to ship.
Your keys, your accounts
Anthropic, OpenAI, infra, observability — all run on your accounts with your keys. We never proxy or mint credentials on your behalf.
Audit-traceable AI
Every prompt, retrieval, tool call, and output logged with reasoning. Auditors get a reproducible trail. We design to that standard from day one.
No training on your data
We use Anthropic and OpenAI's API tiers that exclude customer data from training. We don't fine-tune on your data without an explicit agreement.
Technical controls
Encryption in transit
TLS 1.2+ everywhere. HSTS on public endpoints. Mutual TLS available for on-prem and edge gateway deployments.
Encryption at rest
AES-256 on databases, object storage, and backups. Customer-managed keys (CMK / KMS) supported for enterprise engagements.
Network controls
VPC isolation, private networking between services, IP allowlists for admin paths, WAF on customer-facing surfaces. No public DB endpoints.
Identity + access
SSO via SAML / OIDC. Hardware-key MFA required for engineers with access to client systems. Per-engagement repo and credential scoping.
Secrets management
Doppler / 1Password / Vault on our side. We use your secrets manager when working in your infra. No secrets in source, ever.
Logging + monitoring
Application logs to Langfuse + your SIEM. Anomaly alerts route to on-call. We keep 90 days at full fidelity, then anonymized aggregates.
Vulnerability management
Dependabot + Renovate on every repo. SCA + SAST in CI. Quarterly internal pen test on shared infrastructure.
Backup + recovery
Daily encrypted backups with point-in-time recovery (Postgres). Restore drills quarterly. RTO ≤ 4 hours / RPO ≤ 1 hour for retained systems.
Compliance posture
| Framework | Status | Notes |
|---|---|---|
| GDPR | Aligned · DPA on file | We sign your DPA or use ours. SCCs included for EU↔non-EU transfers. |
| India DPDP Act | Aligned · DPA on file | Standard Indian DPDP-aligned DPA template available. |
| HIPAA | BAA available | For healthcare engagements. Routed through Anthropic / OpenAI enterprise tiers with BAA. |
| SOC 2 Type II | In progress | We build to SOC 2 controls. Type II audit underway with target completion later this year. |
| ISO 27001 | Build-to standard | We build deployments to ISO 27001 readiness. Audit is between you and your auditor. |
| PCI DSS | Out of scope | We don't process card data. Engagements with PCI requirements use compliant payment providers. |
Need a specific framework that's not listed? Email security@aliansoftware.net — we'll tell you honestly whether we can meet it.
Deployment options
We deploy where your data residency requirements need us to:
- Multi-region cloud — AWS / GCP / Azure in your region of choice. Vercel for client-side, your accounts for the rest.
- Hybrid / edge gateway — Real-time data and agent orchestration on-prem (NUC-class hardware), reasoning in the cloud over scoped channels. Used by manufacturing clients.
- Fully on-prem — Open-source models via vLLM on your hardware when even the reasoning loop can't leave your network. Slower iteration, but doable.
Incident response
Five steps, in order, every time. We don't improvise during an incident.
- 1Detection — alerting on our infra and on yours (with permission)
- 2Triage — on-call engineer paged within 15 minutes during business hours, 1 hour off-hours
- 3Containment — scoped credentials revoked, blast radius mapped
- 4Notification — affected clients notified within 24 hours of confirmed material incident
- 5Postmortem — written within 5 business days, shared with affected clients in full
Want a deeper security review?
We have a packet for your security team — current SOC 2 progress, DPA template, SCCs, incident response runbook, sub-processor list. Email and we'll send it within a business day.
Most security reviews close in under a week.