Security

Security in plain English.

What we encrypt, what we never store, and what we will do if something breaks.

Architecture controls.

What we do not do.

  • Store passwords (we do not have a password column anywhere in our schema).
  • Log access tokens or refresh tokens in plaintext.
  • Expose JWTs in URLs except during the brief redirect step of OAuth/magic-link callbacks; cookies thereafter.
  • Charge for SOC 2 reports — they will be available under NDA when reports are issued.
  • Sell or share customer data with third parties.
  • Run customer queries against a shared training corpus or LLM provider.

Compliance posture.

SOC 2: pre-audit readiness today, Type I audit window targeted for 2027-Q1, Type II for 2027-Q3. We run the controls and gather evidence now so the auditor walks in to six months of trail rather than starting from zero. Full posture, the TSC control matrix, the policy set, the runbooks, and the risk register are on the compliance page.

ISO 27001 + HIPAA BAA (for the Enterprise tier) are on the public roadmap. GDPR and CCPA compliance is in place today; see our Privacy Policy and the sub-processor list.

A coordinated disclosure program runs out of security@authio.com. A public bug bounty with monetary rewards is planned once we exit beta.

What we will do if something breaks.

We commit to a no-jargon incident process. If a security incident materially affects your project we will notify the project owner email of record within 72 hours of confirmed impact (sooner where regulation requires it), with a written description of what happened, what data was affected, what we have done, and what you should do.

Post-incident, we publish a public retrospective with the timeline, the root cause, and the action items — redacted only where customer data or another party’s identity would be exposed. Status updates during the incident live on the status page.

Report a vulnerability: security@authio.com. PGP key on request.