SECURITY · TRUST · INFRASTRUCTURE

Built for buyers whose security review is the hard part.

This is the page your security team is going to read before your legal team signs an MSA. We've tried to put everything they need on one screen.

SOC 2 Type II in progress · AES-256 at rest · TLS 1.2+ in transit · MFA enforced · 72-hour breach notification
AES-256
Encryption at rest, including consent vault
TLS 1.2+
Encryption in transit, TLS 1.3 preferred
MFA
Required for all employee & contractor access
72 hr
Customer notification on confirmed incidents
90 days
Server log retention before de-identification
At a glance

What your security team needs in 30 seconds.

Compliance posture

SOC 2 Type II in progress, target Q3 2026. Interim letter from our auditor available under NDA. ISO 27001 on the roadmap.

  • GDPR & UK GDPR — DPA + SCCs available
  • CCPA / CPRA — compliant
  • BIPA / CUBI / WA — compliant
  • EU AI Act Art. 5 & 53 — ready
  • C2PA provenance — compatible

Encryption & access

Defense-in-depth, with the consent vault on its own VPC and IAM boundary.

  • AES-256 at rest, TLS 1.2+ in transit
  • Role-based access, least privilege
  • MFA enforced for all human access
  • Hardware tokens for engineering & vault
  • Tamper-evident audit log on the vault

Incident response

Documented playbook with notification commitments under GDPR Art. 33 and U.S. state breach laws.

  • 72 hr customer notification
  • Regulator notification within 72 hr
  • Speaker notification when implicated
  • Root-cause analysis & written report
  • Continuous dependency scanning, quarterly pen test
Architecture

A narrow, audit-friendly stack.

We deliberately chose a small number of well-understood services to minimize attack surface and simplify diligence.

Cloud infrastructure

Provider
AWS
Default region
us-east-1
EU residency
eu-west-1 available

Audio storage

Encryption
Server-side, managed keys
Versioning
Enabled
MFA-delete
Required for production
Logging
Bucket-level access logs

Consent vault

Isolation
Separate database, separate VPC, separate IAM
Encryption
Application-layer + storage-layer
Access
Smaller authorized set, fully logged

Delivery layer

Pattern
Signed URLs + cross-account roles
Targets
S3, GCS, Azure Blob
Manifest
Signed JSON with SHA-256

Identity

SSO
Google Workspace
MFA
Enforced on every account
Hardware tokens
Engineering & vault accounts

Logging & monitoring

Logging
Centralized
Alerting
Access anomalies
Audit
Tamper-evident vault log
Sub-processors

Current sub-processor list.

Customers can subscribe to be notified of any addition. Full list maintained at /security/subprocessors.

Sub-processorPurposeData residency
AWSPrimary cloud infrastructureus-east-1, eu-west-1
StripePayments & invoicingUS
PostmarkTransactional emailUS
PlausiblePrivacy-respecting site analyticsEU
Help ScoutCustomer inquiriesUS
ClerkAuthentication for customer dashboardsUS
Retention

Data handling and retention.

Data typeRetentionNotes
Source audioCatalog file lifetimeDeleted on valid speaker revocation
Consent vault recordsCatalog lifetime + 7 yearsOr longer if required by law
Customer account dataRelationship + 7 yearsTax and audit
Authorized user credentialsDuration of accessHashed with argon2id
Server logs90 daysThen aggregated and de-identified
Voice biometric verification12 monthsDeleted earlier on request
Personnel & process

How humans access the systems.

Personnel security

None

  • Background checks (where legally permitted)
  • Annual security awareness training
  • Role-specific training for vault personnel
  • Confidentiality agreements before access
  • Quarterly access reviews
  • Immediate revocation on termination

Customer commitments

None

  • Restrict access to authorized users
  • Encrypt in transit and at rest
  • Maintain access logs
  • Promptly notify us of suspected unauthorized access
  • Cooperate on revocation notices
  • Follow Acceptable Use clause

Responsible disclosure

Found something? Email security@aipodcast.io. We respond within 1 business day and coordinate disclosure in good faith.

Report a security issue →

Want the full security pack?

SOC 2 interim letter, sub-processor list, DPA, SCCs, pen-test summary, IR plan summary, and security FAQ — delivered under NDA.