Architecture and encryption
Our stack is built on hardened cloud infrastructure with layered controls to safeguard customer data.
- All traffic is encrypted in transit using modern TLS; data at rest uses strong encryption (for example AES-256) with managed keys.
- Secrets are stored in dedicated secrets management systems with strict access policies and audit logs.
- Production and corporate environments are segmented, with least-privilege access between services.