Security and compliance by design.
We build and operate systems where the data matters: finance, accounting, compliance workflows, and sensitive documents. Security is treated as an operating discipline — identity boundaries, encryption boundaries, change control, and audit-friendly logging. We’re also building with the intention of pursuing SOC 2–aligned controls across the portfolio as products mature.
- Role-based access and separation of duties where applicable
- Prefer short-lived credentials and narrow scopes over standing access
- Access reviews and tight onboarding/offboarding discipline
- Event logging and workflow audit trails (especially for documents and signatures)
- Change tracking for critical configuration and integrations
- Operational visibility so exceptions aren’t invisible
- Idempotent writes and dedupe safety to prevent duplicates
- Backoff/retry for flaky third-party APIs
- Safe failure modes that preserve integrity over convenience
- TLS for transport; HTTPS-only where applicable
- At-rest encryption via cloud primitives (volume/object/database encryption)
- Scoped access (e.g., signed URLs) for document delivery features when used
Building toward SOC 2 readiness
We design controls and operational habits that map cleanly to common SOC 2 expectations (security, availability, confidentiality, and processing integrity). Timing and scope vary by product and partner constraints — we don’t claim attestation on a marketing page.
- Explicit trust boundaries and scoped permissions
- Deterministic processing with replayable inputs where appropriate
- Evidence trails that tie actions to outcomes
- Incident response expectations and escalation paths
- Backups and restore strategy with periodic verification
- Monitoring/alerting with actionable signals
- Access reviews and change visibility
- Vendor/subprocessor awareness and scoped data sharing
- Log retention and audit-friendly artifacts where applicable
Designed for environments with real compliance pressure
We design systems to satisfy rigorous control expectations: explicit trust boundaries, strong IAM, audit-friendly artifacts, deterministic processing, encryption boundaries, and measurable operations.
- Least privilege and role-based permissions
- Strong authentication patterns and session controls
- Tenant isolation and scoped access to sensitive data
- Redundancy patterns where appropriate (service/AZ/region level)
- Backups and restore strategies; recovery procedures where required
- Monitoring and alerting so failures aren’t silent
- Idempotency and dedupe safety for workflows
- Validation and deterministic handling of critical inputs
- Reconciliation-friendly error states and retriable operations
- Encryption at rest/in transit; scoped access to documents and records
- Minimize sensitive data exposure in logs and downstream integrations
- Explicit data-flow boundaries and least-data sharing
- Retention-aware designs and lifecycle behavior where applicable
- Access logging and evidentiary trails for sensitive workflows
- Vendor/integration boundaries designed to reduce leakage
- Audit trails: who/what/when across critical operations
- Change control patterns and configuration traceability
- Runbook-driven operations and measurable targets
We build systems that are easy to reason about under audit and under stress: explicit permissions, reliable logging, deterministic processing, encryption boundaries, and measurable operations. The goal is security controls that are real, testable, and maintainable — not afterthought checkboxes.
Practical controls that reduce risk
These are the types of technical and operational controls we commonly implement across the portfolio. Exact measures vary by product, environment, and partner requirements.
- Transport encryption (TLS) for network connections
- At-rest encryption for persisted data and backups/snapshots where applicable
- Scoping and access controls around storage and backups
- Field/document encryption for high-sensitivity data where appropriate
- Envelope encryption patterns (data keys wrapped by a key-encryption key) where appropriate
- Key separation so decrypt capability is not co-located with ciphertext by default
- Per-tenant or per-domain key scoping where appropriate
- KMS/HSM-backed key storage patterns where available; no hardcoded keys
- Rotation strategies and lifecycle controls where feasible
- No secrets in source control; structured injection patterns
- Environment separation (dev/stage/prod) and permission boundaries
- Rotation and lifecycle discipline when supported by vendors
- Passwords stored as salted, memory-hard hashes (implementation varies by system)
- Multi-factor authentication support where applicable
- Session/token practices designed to reduce replay and long-lived exposure
- Schema validation and strict parsing
- Parameterized queries/prepared statements where applicable
- Defense against common OWASP classes of issues
- Web application firewall / managed rules where appropriate
- Content Security Policy (CSP) to constrain resource loading
- Strict Transport Security (HSTS) to enforce HTTPS
- Centralized logging patterns and alerting hooks
- Anomaly detection, rate limiting, and abuse controls when needed
- Operational visibility and measurable failure modes
- Use subprocessors only as needed to deliver features
- Scope what data is shared and why (least data principle)
- Guardrails and boundaries around integrations
What we do and don’t claim
- • Design with least privilege, auditability, and secure defaults
- • Implement encryption patterns appropriate to data sensitivity
- • Use key management designs that reduce blast radius and minimize key exposure
- • Build systems that are measurable, monitorable, and operable
- • Build with the intention of pursuing SOC 2–aligned controls as products mature
- • Promise “perfect security” (no one credible does)
- • Guarantee uninterrupted service in all circumstances
- • Publish system-specific control details publicly
- • Claim SOC 2 attestation unless and until it’s formally completed for a product