Skip to content

Trust Center

Security

Defense-in-depth, data protections, and product security practices.

Compliance

SOC2 roadmap and audit readiness.

Privacy

Data processing & subprocessors.

Audit‑ready by design

Signed, hash‑chained receipts provide a tamper‑evident record aligned with SOC 2 / ISO / NIST expectations. Faster audit prep, stronger incident response.

Learn about receipts →

Consent & Control

Every delegated action is time‑bound, budget‑bounded, and linked to explicit consent. If limits are exceeded, access is blocked with a clear reason and a full audit trail.

See how it works →