Security
At SecureSlate, security is at the core of everything we build. This page provides transparency into our security practices, certifications, and infrastructure to help enterprise customers and prospects understand our security posture during vendor reviews.
Certifications and third-party assessments
SOC 2 Type II
SecureSlate is SOC 2 Type II certified, demonstrating our commitment to maintaining robust security controls for availability, confidentiality, and data integrity. Our SOC 2 audit covers our platform infrastructure, data handling practices, and operational procedures.
To request a copy of our SOC 2 Type II report, please visit our Trust Center or contact your account manager. We require a signed NDA for report access.
ISO 27001
We maintain ISO 27001 certification for our information security management system (ISMS). This internationally recognized standard validates our systematic approach to managing sensitive company and customer information.
Additional compliance
SecureSlate supports compliance with HIPAA, GDPR, PCI DSS, and other major frameworks. Our platform is designed with compliance requirements built-in, helping our customers meet their regulatory obligations.
Infrastructure security
Cloud infrastructure
SecureSlate is hosted on Google Cloud Platform (GCP), benefiting from enterprise-grade infrastructure with robust physical security, network isolation, and redundancy. Our infrastructure is distributed across multiple regions to ensure high availability and disaster recovery capabilities.
Least-privilege access
We enforce least-privilege access controls across all systems. Team members are granted access only to the resources necessary for their specific roles. Access requests are reviewed and approved by managers, with regular access reviews conducted quarterly.
Multi-factor authentication
MFA is enforced for all production systems, administrative consoles, and critical infrastructure. We use hardware security keys and authenticator apps for strong authentication. Privileged access requires additional verification steps.
Network security
Our network is protected by Cloudflare, providing DDoS protection, WAF (Web Application Firewall), and bot management. All traffic is encrypted in transit using TLS 1.3. We employ network segmentation and VPC isolation to limit blast radius.
AI and data handling
How we use AI
SecureSlate leverages AI to enhance compliance workflows, automate document analysis, and provide intelligent recommendations. When AI features are used, customer data may be processed by our AI subprocessor (OpenAI) solely for the purpose of providing the requested service.
Data retention for AI processing
We have a zero data retention agreement with our AI providers. Customer data processed for AI features is not retained by the AI provider after the request is completed. SecureSlate does not use customer data to train AI models without explicit consent.
Customer control
Customers have control over which features use AI processing. AI-powered features can be disabled at the organization level, and customers can choose to use manual workflows instead.
Data isolation and multi-tenancy
Tenant isolation
SecureSlate employs logical tenant isolation to ensure customer data is strictly separated. Each customer's data is tagged and filtered at the application layer, with database-level row-level security (RLS) policies enforcing access boundaries.
Encryption at rest
All customer data is encrypted at rest using AES-256 encryption. Encryption keys are managed through Google Cloud's Key Management Service (KMS) with regular key rotation. Database backups are also encrypted.
Encryption in transit
All data in transit is encrypted using TLS 1.2 or higher. We enforce HSTS (HTTP Strict Transport Security) and use certificate pinning where applicable. Internal service-to-service communication is also encrypted using mutual TLS (mTLS).
Access controls
Internal access management
Access to production systems is strictly limited to authorized personnel who require it for their job functions. We maintain comprehensive audit logs of all access to production data and systems.
Single Sign-On (SSO)
SecureSlate supports SAML 2.0 and OIDC-based SSO for customer authentication. Enterprise customers can enforce SSO to ensure consistent authentication policies across their organization.
Team security practices
All SecureSlate team members undergo security awareness training upon onboarding and annually thereafter. We enforce strong password policies, device encryption, and screen lock requirements for all company devices.
Account deletion
Requesting data deletion
Customers can request deletion of their account and all associated data by contacting support@getsecureslate.com or through their account settings. Data deletion requests are processed in accordance with our data retention policies and applicable legal requirements.
Deletion SLA
We complete data deletion within 30 days of receiving a verified request. This includes:
- Active database records
- Cached data and CDN content
- Log data (within retention limits required for security and compliance)
- Backup data (as backups rotate, typically within 90 days)
Some data may be retained longer if required by law or for legitimate business purposes such as fraud prevention, security investigations, or compliance with legal obligations.
Vulnerability disclosures
Security contact
If you believe you've discovered a security vulnerability in SecureSlate, please report it to us at security@getsecureslate.com. We encourage responsible disclosure and will work with you to address any confirmed issues.
Response commitment
We commit to acknowledging vulnerability reports within 2 business days. Our security team will assess reported issues and provide updates on our investigation and remediation progress. We strive to resolve critical vulnerabilities within 30 days.
Bug bounty program
SecureSlate does not currently operate a public bug bounty program. We appreciate responsible disclosure from security researchers and will recognize their contributions where appropriate.
Safe harbor
We support safe harbor for security researchers who:
- Make good faith efforts to avoid privacy violations and service disruptions
- Do not access, modify, or delete data belonging to others
- Provide sufficient information to reproduce and verify the vulnerability
- Do not publicly disclose vulnerabilities before we've had reasonable time to address them
We will not take legal action against researchers who follow these guidelines.
For additional security information or to request documentation, please contact us at security@getsecureslate.com.