Security Architecture
Defense-in-depth woven into every layer of the stack.
Row-Level Security (RLS)
We don't just rely on application logic. Every query is scoped by `organization_id` at the Postgres kernel level, mathematically proving tenant isolation.
Envelope Encryption
Sensitive provider credentials are encrypted using AES-256-GCM with unique Initialization Vectors (IVs) per record. Keys are managed separately from data.
Non-Recoverable Secrets
Boundrix API keys are stored as cryptographic hashes. We literally cannot see your API keys after they are generated.
Immutable Audit Logs
Critical actions (Contract Changes, Member Invites, Policy Overrides) are written to a tamper-evident append-only ledger (`audit_logs`) for compliance forensics.
Compliance Roadmap
- SOC 2 Type II: We have implemented all requisite controls (Audit Logs, RLS, Encryption) and are currently preparing for our inaugural audit window (Q3 2026).
- GDPR/CCPA: Platform architecture supports full data subject rights (Right to be Forgotten) and region-locking for EU/US residency.
- Penetration Testing: We conduct internal gray-box assessments and are scheduling third-party validation.
Vulnerability Disclosure
We operate a private vulnerability disclosure program. If you identify a potential security issue, please contact us at security@boundrix.ai.