Skip to main content
Back to HomeSecurity Program

Security At p15r

Security and privacy are built into platform operations, from authentication and data handling to monitoring and incident response.

Encryption in transit and at restRole-based access controlsIncident response readiness
Security Snapshot

Authentication

Clerk-based identity stack

Supports enterprise authentication requirements

Data handling

Encrypted storage and transport

Protected both at rest and in transit

Operations

Monitoring and incident workflows

Designed for rapid detection and response

Core Controls

Security Foundations

Encryption At Rest

Stored data is encrypted with strong encryption standards across database and file storage layers.

Encryption In Transit

All application traffic is protected with modern TLS to secure data between clients and services.

Secure Authentication

Authentication is handled through Clerk with support for SSO, MFA, and enterprise identity providers.

Secure Infrastructure

Workloads run on enterprise cloud infrastructure with strong operational and security controls.

Access Controls

Role-based access limits data visibility and actions to authorized users and teams.

Backup And Recovery

Automated backups and recovery options support continuity and incident recovery workflows.

Infrastructure Security

  • SOC 2-oriented cloud platform foundations
  • DDoS protection and web application firewall coverage
  • Automated patch and update strategy
  • Continuous monitoring and operational alerting

Application Security

  • Regular security testing and review cycles
  • Secure software development lifecycle practices
  • Dependency and vulnerability scanning
  • Input validation and output encoding standards

Compliance

Standards And Frameworks

GDPR

EU data protection framework

CCPA

California privacy regulation

SOC 2

Infrastructure control alignment

WCAG 2.2

Accessibility conformance baseline

HIPAA

Available for qualifying healthcare use cases

Data Residency

Default hosting is in the United States. For enterprise customers with regional requirements, p15r can support residency options and contractual data handling controls.

  • EU data residency options
  • Custom enterprise data residency configurations
  • Data Processing Agreements for compliance alignment

Contact sales@p15r.io for enterprise options.

Incident Response

The incident response process is designed for fast triage, controlled escalation, and transparent communication with affected customers.

  • 24/7 monitoring and alerting
  • Defined security escalation and triage procedures
  • Customer notification process for confirmed incidents
  • Post-incident analysis and remediation tracking

Report A Security Vulnerability

If you identify a potential vulnerability, please report it responsibly. We review every submission and prioritize confirmed security issues.