Aligned logo

Security

Your data protected by AES-256-GCM encryption with Supabase Vault, Row-Level Security, and SOC 2 Type I controls (audit in progress)

SOC 2 Type I

Audit in progress — Target Q2 2026

SOC 2 Type II

Audit planned — Target Q3 2026

ISO 27001

Controls Implemented

GDPR

Compliant — US-hosted (AWS Oregon). EU region available on request.

Security Controls

Security by the Numbers

Measurable security controls we can demonstrate on request

100%

User data tables with Row-Level Security

All user data protected at database level

Dual-Layer

AES-256-GCM + Vault encryption

Defense in depth for all tokens

MFA Enforced

For all admin access

Multi-factor authentication required

Tamper-Proof

Audit log integrity

SHA-256 hash-chain verification

Defense in Depth

Security in Detail

Comprehensive security controls across every layer of our platform

Trusted Partners

Our Subprocessors

All subprocessors maintain independent security certifications

Clerk

Authentication

SOC 2 Type II
Data Processing Addendum

Supabase

Database & Storage

SOC 2 Type II
Data Processing Addendum

AWS

Hosting & Storage

SOC 2 Type II
Data Processing Addendum

OpenAI

AI Processing

SOC 2 Type II
Data Processing Addendum

Anthropic

AI Processing

SOC 2 Type II
Data Processing Addendum

AssemblyAI

Transcription

SOC 2 Type II
Data Processing Addendum

Stripe

Payment Processing

PCI DSS Level 1
Data Processing Addendum

Google

Gmail & Calendar

SOC 2 Type II
Data Processing Addendum

Microsoft

Teams Integration

SOC 2 Type II
Data Processing Addendum

Atlassian

JIRA Integration

SOC 2 Type II
Data Processing Addendum

Slack

Messaging Integration

SOC 2 Type II
Data Processing Addendum

Zoom

Meeting Intelligence

SOC 2 Type II
Data Processing Addendum

LiveKit

Voice & Video

SOC 2 Type II
Data Processing Addendum

Mem0

AI Memory

SOC 2 Type I
Data Processing Addendum

ElevenLabs

Voice Synthesis

SOC 2 Type II
Data Processing Addendum
13 SOC 2 Type II
1 SOC 2 Type I
1 PCI DSS

Security Questions?

We're happy to complete security questionnaires, answer detailed questions, and provide additional documentation for enterprise evaluations.

Typical response time: within 24 hours

Automated Security MonitoringCI/CD scans on every pull request
Incident Response PlanGDPR Article 33 breach workflow
Encryption in TransitTLS 1.2+
Internal Security AuditsHash-chain verified audit trail

Ready to see how Aligned Tools can help your team?

Schedule a Security Review
    Security | Aligned Tools - Enterprise-Grade Protection | Aligned Tools