Security
Last Updated: January 14, 2026
At PerfectCSR.AI, security isn't just a featureโit's the foundation of everything we build. We understand that you're entrusting us with sensitive customer conversations, business data, and your reputation. This page outlines our comprehensive security practices, certifications, and commitments.
We maintain SOC 2 Type II certification for independently audited security controls, and ISO 27001 certification for our information security management system. All data is protected with TLS 1.3 encryption in transit and AES-256 encryption at rest.
Security at a glance
We're SOC 2 Type II certified, ISO 27001 compliant, and GDPR/CCPA compliant. All data is encrypted in transit and at rest. Your training data is never used for our general AI models. We have 24/7 security monitoring, regular third-party penetration testing, and a dedicated security team.
Our Security Commitment
Our security program is built on the CIA triadโthree fundamental principles that guide every decision:
- Confidentiality: Your data is protected from unauthorized access through encryption, access controls, and strict data isolation
- Integrity: Your data remains accurate and protected from unauthorized modification through checksums, audit logging, and change tracking
- Availability: Your data and our Services are available when you need them with 99.9% uptime SLA and redundant infrastructure
Certifications & Compliance
๐ SOC 2 Type II
Independently audited security controls for security, availability, processing integrity, confidentiality, and privacy. Report available under NDA.
๐ ISO 27001
Certified Information Security Management System (ISMS) ensuring systematic management of sensitive information.
๐ช๐บ GDPR Compliant
Full compliance with EU General Data Protection Regulation including DPAs, SCCs, and data subject rights. Learn more โ
๐บ๐ธ CCPA/CPRA Compliant
California Consumer Privacy Act and Privacy Rights Act compliance for California residents.
Additional Frameworks
- HIPAA Ready: Available for healthcare customers with BAA
- PCI DSS: Compliant payment processing through certified partners
- CSA STAR: Cloud Security Alliance security assessment
Data Encryption
๐ Encryption in Transit
- TLS 1.3 with strong cipher suites (AES-GCM, ChaCha20-Poly1305)
- HTTPS enforced on all connections (HSTS with preload)
- Perfect Forward Secrecy (PFS) for all sessions
- Certificate pinning for mobile applications
- Regular TLS configuration audits
๐ Encryption at Rest
- AES-256-GCM encryption for all stored data
- Customer-managed encryption keys (CMEK) available for Enterprise
- Hardware Security Modules (HSMs) for key storage
- Encrypted backups with separate key management
- Automatic key rotation policies
Legal stuff made easy
Your data is always encryptedโboth when it's moving between systems (TLS 1.3) and when it's stored (AES-256). We use industry-leading encryption standards and enterprise customers can even manage their own encryption keys.
Infrastructure Security
โ๏ธ Cloud Infrastructure
- Hosted on AWS with SOC 2, ISO 27001, and FedRAMP certified data centers
- Multi-region deployment across US, EU, and APAC for high availability
- Virtual Private Cloud (VPC) with network isolation
- AWS Shield Advanced for DDoS protection
- AWS WAF (Web Application Firewall) with custom rule sets
- Auto-scaling for resilience and performance
๐ Network Security
- Network segmentation with micro-segmentation
- Zero-trust architecture principles
- Intrusion Detection and Prevention Systems (IDS/IPS)
- 24/7 Security Operations Center (SOC) monitoring
- Real-time threat intelligence feeds
- Quarterly penetration testing by certified third parties
Application Security
๐ ๏ธ Secure Development Lifecycle
- Secure Software Development Lifecycle (SSDLC) integrated into CI/CD
- Mandatory code reviews for all changes
- Static Application Security Testing (SAST) on every commit
- Dynamic Application Security Testing (DAST) on staging environments
- Software Composition Analysis (SCA) for dependency vulnerabilities
- Security-focused QA and regression testing
๐ Authentication & Access Control
- Multi-factor authentication (MFA) with TOTP, WebAuthn, and hardware keys
- Single Sign-On (SSO) with SAML 2.0, OAuth 2.0, and OpenID Connect
- Role-Based Access Control (RBAC) with custom roles
- Session management with configurable timeouts
- API key authentication with scoped permissions and rotation
- IP allowlisting for Enterprise customers
AI Model Security
๐ค Data Isolation
- Your data is never used to train our general AI models
- Strict logical separation between customer data
- Custom models are isolated per customer account
- No data sharing between customers under any circumstances
- Optional data residency controls for Enterprise
๐ก๏ธ AI Safety Measures
- Input validation and sanitization against prompt injection
- Output filtering for harmful, sensitive, or inappropriate content
- Rate limiting and abuse prevention
- Content moderation controls
- Jailbreak detection and prevention
- Audit logging of all AI interactions
Operational Security
๐ฅ Access Control & Personnel
- Principle of least privilege for all access
- Background checks for all employees
- Mandatory security awareness training (initial + annual refresher)
- Quarterly access reviews and certification
- Immediate access revocation upon termination
- Secure remote work policies
๐จ Incident Response
- 24/7 security monitoring and on-call incident response team
- Documented incident response procedures (NIST-aligned)
- Regular tabletop exercises and incident response drills
- Customer notification within 72 hours of a confirmed breach
- Post-incident analysis and continuous improvement
Business Continuity & Disaster Recovery
- 99.9% uptime SLA for Enterprise customers (99.95% available)
- Automated backups every hour with 30-day retention
- Point-in-time recovery capability
- Recovery Time Objective (RTO): < 4 hours
- Recovery Point Objective (RPO): < 1 hour
- Annual disaster recovery testing with documented results
- Geographically distributed infrastructure
Vendor Security
We carefully vet all third-party vendors and require them to meet our security standards:
- Security assessments before onboarding
- Contractual security requirements and DPAs
- Regular vendor security reviews
- Limited data sharing based on necessity
- Sub-processor list maintained and available upon request
Vulnerability Disclosure Program
We maintain a responsible disclosure program for security researchers. If you discover a security vulnerability, please report it responsibly:
๐ How to Report
Email: security@perfectcsr.ai
PGP Key: Available upon request
Our Commitment:
- โ Acknowledge receipt within 24 hours
- โ Provide regular updates on our progress
- โ No legal action for good-faith security research
- โ Recognition in our Security Hall of Fame (optional)
- โ Bug bounty rewards for qualifying vulnerabilities
Security Resources
- SOC 2 Type II Report: Available under NDAโcontact security@perfectcsr.ai
- Penetration Test Summary: Available upon request for Enterprise customers
- Security Whitepaper: Comprehensive security documentation available
- Data Processing Agreement (DPA): Available for download or upon request
Contact Our Security Team
For security-related inquiries, vulnerability reports, or to request security documentation:
PerfectCSR.AI Security Team
Email: security@perfectcsr.ai
PGP Key: Available upon request
Response Time: Within 24 hours for security matters