Security
Your data is sacred. Here’s how we protect it.
Our commitment
Security isn’t a feature we added — it’s foundational to everything we build. Confidentiality, integrity, and resilience are designed into the platform from the first commit.
Your documents, conversations, and workspace context are confidential. Encryption, isolation, and access controls protect every interaction on the platform.
Infrastructure security
SOC 2 certified
Our platform has achieved SOC 2 certification, verified by an independent third-party auditor. This covers security, availability, processing integrity, confidentiality, and privacy controls across our entire infrastructure.
Encryption
All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Database backups, document storage, and inter-service communication are all encrypted end-to-end. Encryption keys are managed through a dedicated key management service with automatic rotation.
Cloud infrastructure
Our platform runs on enterprise-grade cloud infrastructure with redundant availability zones and automated failover. All infrastructure is provisioned through infrastructure-as-code with full audit trails. Production environments are isolated from development and staging.
Network security
All external traffic passes through a web application firewall (WAF) and DDoS protection layer. Internal services communicate over private networks with mutual TLS authentication. Penetration testing and vulnerability assessments are part of our security program.
Data isolation and privacy
Client data isolation
Every client’s data is logically isolated at the application and database level. Your documents, conversations, and workspace context are never accessible to other clients — not even within our internal systems. Access controls are enforced at every layer of the stack.
Your data stays yours
Your documents and interactions are scoped to your account. The platform applies your context to each request, and that context is never shared with or accessible to other clients. When you leave the platform, your data is purged according to our retention policy.
Data residency
All client data is stored in the United States. For clients with specific data residency requirements, we offer dedicated infrastructure configurations. Contact us for details on regional data hosting options.
Access controls
Authentication
All client accounts are protected by multi-factor authentication (MFA). We support SSO integration for enterprise clients. Session tokens are short-lived and automatically rotated. Failed login attempts trigger account lockout protections and security alerts.
Internal access
Access to client data is restricted on a strict need-to-know basis. Only authorized personnel assigned to your account and essential engineering staff (for platform maintenance) can access your data. All internal access is logged, audited, and reviewed. We enforce the principle of least privilege across all systems.
Role-based permissions
Enterprise clients can configure role-based access controls for their team members — controlling who can view documents, submit requests, and manage billing. Audit logs are available for all team activity.
AI model security
Foundation model providers
Our AI agents use foundation models from established AI providers, accessed through enterprise APIs governed by data processing agreements. Customer data sent for inference is contractually prohibited from being used to train provider models. We evaluate providers against our security and privacy bar, including independent certifications (SOC 2) and minimal-retention configurations where supported.
Prompt injection and adversarial protections
Our AI agents include multiple layers of protection against prompt injection, data exfiltration, and adversarial inputs. All outputs are validated before delivery. Sensitive data is automatically detected and redacted from logs and monitoring systems.
Review controls
AI outputs flow through structured review and quality controls before delivery. The platform supports multi-stage review for high-stakes outputs, clearly labels AI-generated content, and maintains audit trails for every generation.
Compliance
The platform maintains compliance with applicable technical and regulatory frameworks, including SOC 2 and HIPAA.
Incident response
We maintain a documented incident response plan with defined escalation procedures, notification timelines, and remediation processes. In the event of a security incident affecting your data, we will notify affected clients in accordance with applicable breach notification laws.
Vendor security
All third-party vendors and service providers undergo security review before onboarding. We require SOC 2 certification (or equivalent) from all vendors who process client data. Vendor access is limited to the minimum necessary for service delivery, and all vendor agreements include confidentiality and data protection provisions.
Business continuity
Our platform is designed for high availability with automated backups, geographic redundancy, and documented disaster recovery procedures. Backups are stored in a geographically separate region from primary infrastructure and tested as part of our recovery program.
Contact
If you have questions about our security practices, need to report a vulnerability, or require a copy of our SOC 2 report, please contact us at security@blueshoe.com.
For enterprise clients with specific compliance or security requirements, we offer dedicated security reviews, custom data processing agreements, and tailored infrastructure configurations. Reach out to discuss your needs.