Security

Last updated:

At SecureSlate, security is at the core of everything we build. This page provides transparency into our security practices and infrastructure to help customers and prospects understand our security posture during vendor reviews.

Security program and assessments

SecureSlate complies with GDPR, NIS 2, DORA, and CCPA. We maintain internal security controls and operational practices designed to protect customer data and support security reviews.

For security documentation, questionnaires, or vendor risk assessment support, please contact security@getsecureslate.com.

Infrastructure security

Cloud infrastructure

SecureSlate is hosted on Google Cloud Platform (GCP), benefiting from enterprise-grade infrastructure with robust physical security, network isolation, and redundancy.

Least-privilege access

We enforce least-privilege access controls across all systems. Team members are granted access only to the resources necessary for their specific roles. Access requests are reviewed and approved by managers, with regular access reviews conducted quarterly.

Multi-factor authentication

MFA is enforced for all production systems, administrative consoles, and critical infrastructure. Strong authentication uses approved factors such as authenticator apps. Privileged access requires additional verification steps.

Network security

Our network is protected by Cloudflare, providing DDoS protection, WAF (Web Application Firewall), and bot management. All traffic is encrypted in transit using at least TLS 1.2 (TLS 1.3 where supported).

AI and data handling

How we use AI

SecureSlate leverages AI to enhance compliance workflows, automate document analysis, and provide intelligent recommendations. When AI features are used, customer data may be processed by our AI subprocessor (OpenAI) solely for the purpose of providing the requested service.

Data isolation and multi-tenancy

Tenant isolation

SecureSlate employs logical tenant isolation to ensure customer data is strictly separated. Each customer's data is tagged and filtered at the application layer, with access boundaries enforced through scoped access controls.

Encryption at rest

All customer data is encrypted at rest using AES-256 encryption. Encryption keys are managed by Google Cloud using Google-managed encryption keys. Database backups are also encrypted.

Encryption in transit

All data in transit is encrypted using TLS 1.2 or higher. We enforce HSTS (HTTP Strict Transport Security) and use certificate pinning where applicable.

Access controls

Internal access management

Access to production systems is strictly limited to authorized personnel who require it for their job functions. We maintain comprehensive audit logs of all access to production data and systems.

Single Sign-On (SSO)

SecureSlate supports SAML 2.0 and OIDC-based SSO for customer authentication. Enterprise customers can enforce SSO to ensure consistent authentication policies across their organization.

Team security practices

All SecureSlate team members undergo security awareness training upon onboarding and annually thereafter. We enforce strong password policies, device encryption, and screen lock requirements for all company devices.

Account deletion

Requesting data deletion

Customers can request deletion of their account and all associated data by contacting support@getsecureslate.com or through their account settings. Data deletion requests are processed in accordance with our data retention policies and applicable legal requirements.

Deletion SLA

We complete data deletion within 30 days of receiving a verified request. This includes:

  • Active database records
  • Cached data and CDN content
  • Log data (within retention limits required for security and compliance)
  • Backup data (as backups rotate, typically within 90 days)

Some data may be retained longer if required by law or for legitimate business purposes such as fraud prevention, security investigations, or compliance with legal obligations.

Vulnerability disclosures

Security contact

If you believe you've discovered a security vulnerability in SecureSlate, please report it to us at security@getsecureslate.com. We encourage responsible disclosure and will work with you to address any confirmed issues.

Response commitment

We commit to acknowledging vulnerability reports within 2 business days. Our security team will assess reported issues and provide updates on our investigation and remediation progress. We strive to resolve critical vulnerabilities within 30 days.

Bug bounty program

SecureSlate does not currently operate a public bug bounty program. We appreciate responsible disclosure from security researchers and will recognize their contributions where appropriate.

Safe harbor

We support safe harbor for security researchers who:

  • Make good faith efforts to avoid privacy violations and service disruptions
  • Do not access, modify, or delete data belonging to others
  • Provide sufficient information to reproduce and verify the vulnerability
  • Do not publicly disclose vulnerabilities before we've had reasonable time to address them

We will not take legal action against researchers who follow these guidelines.


For additional security information or to request documentation, please contact us at security@getsecureslate.com.