Security & Compliance
How we protect your data and maintain compliance with financial regulations.
✅
SOC 2 Type I Readiness
All five Trust Service Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy) implemented as technical controls.
🔒
Encryption at Rest
- ●All PII (SSNs, account numbers, EINs) encrypted with AES-256-GCM before database storage
- ●Unique 12-byte IV and 16-byte authentication tag per encrypted field
- ●Encryption keys never stored in code or version control — injected via environment variables
- ●Database connections encrypted with TLS (mysql2 ssl mode)
🌐
Encryption in Transit
- ●HTTPS enforced on all endpoints (HSTS with 2-year max-age, includeSubDomains, preload)
- ●Content-Security-Policy blocks mixed content and unauthorized script sources
- ●API communications with Moov FinCEN and Pabbly use TLS 1.2+
🛡️
Access Control
- ●JWT-based session management with 24-hour expiry
- ●Role-based access control (individual, preparer, admin) enforced at middleware level
- ●Login rate limiting: 10 attempts per minute, lockout after 5 consecutive failures (15 min)
- ●Password requirements: 8+ characters, uppercase, lowercase, number
- ●bcrypt with 12 rounds for password hashing
📋
Audit Logging
- ●Every data mutation (create, update, delete) recorded with user ID, action, entity, IP address, and timestamp
- ●Request tracing with unique X-Request-ID on every HTTP request
- ●Structured JSON logging with correlation IDs for incident investigation
- ●Audit logs retained for compliance review
✍️
E-Signature Integrity
- ●Electronic signatures captured with SHA-256 hash, real client IP, and UTC timestamp
- ●Form 114a authorization acknowledged under penalties of perjury before submission
- ●E-signature audit trail included in every Audit Defense Folder
- ●Signatures retained for 5 years per 31 CFR 1010.350
💼
Data Protection
- ●Privacy-first architecture: bank statements never stored on server
- ●PII encrypted at application layer before database write — database-level encryption is defense in depth
- ●XSS and SQL injection payload scanning on every incoming request
- ●GDPR compliance with cookie consent, data processing agreements, and right to deletion
🚨
Incident Response
- ●Automated security incident detection (login lockouts, XSS/SQLi attempts, rate limit breaches)
- ●Severity classification (low, medium, high, critical) with configurable notification thresholds
- ●Webhook-based alerting for high-severity incidents
- ●Sentry integration for real-time error tracking and performance monitoring
⚙️
Infrastructure
- ●Docker containerized services with isolated networks
- ●MinIO object storage with encryption for document artifacts
- ●Moov FinCEN sandbox for FBAR XML validation before production transmission
- ●Environment-based configuration — no secrets in code
Questions?
For security inquiries, penetration test reports, or to request our Data Processing Agreement, contact security@auditable.tax