Skip to main content

Trust & Security

Security built into the architecture, not bolted on

TorqueShift handles sensitive customer conversations at enterprise scale. SOC 2 Type II, AES-256-GCM encryption, zero-trust access control, and immutable audit logs are standard — not optional add-ons.

Request Security ReviewRequest SOC 2 Report

Certifications

SOC 2 Type II

Annual audit by an independent AICPA-accredited firm covering Security, Availability, and Confidentiality trust service criteria. Report available under NDA to enterprise customers.

ISO 27001 alignment

Information security management system aligned to ISO 27001:2022. Full certification audit scheduled for Q4 2026.

GDPR Article 32 compliance

Technical and organisational measures implemented per Article 32. Data Processing Agreement available for EU customers on request.

Data Protection

Encryption at rest

All customer data is encrypted using AES-256-GCM with per-tenant key isolation. Encryption keys are managed in Azure Key Vault or AWS Secrets Manager, not co-located with data.

Encryption in transit

TLS 1.3 enforced for all API and SignalR connections. HSTS with a 1-year max-age and includeSubDomains. No TLS 1.1 or 1.2 fallback permitted.

PII masking

Phone numbers, email addresses, credit card patterns, IBANs, and national ID numbers are detected and masked in transcripts before storage. Raw audio is retained separately per your retention policy.

Field-level encryption for sensitive records

Sensitive CRM fields (phone, email, account numbers) are encrypted at the field level using AES-256-GCM with nonce-per-encrypt. Plaintext never appears in database dumps.

Access Control

Zero-trust architecture

Every API request is authenticated and authorised. No implicit trust based on network location. JWT tokens validated per request with tenant isolation enforced at the data layer.

Role-based access control

Granular permission matrices covering read, write, and admin operations. Permissions are enforced at the API layer, not only in the UI. Super-admin operations require MFA re-authentication.

SSO and SCIM provisioning

SAML 2.0 and OIDC integration with your identity provider. SCIM 2.0 for automated user lifecycle management. Deprovisioned users are immediately locked out across all sessions.

Immutable audit log

All privileged actions, authentication events, and data exports are written to an append-only audit log. The log is protected by a database trigger that prevents modification by any user, including admins.

Infrastructure

Multi-datacenter with data residency

Tenant data is pinned to a specific region (EU, US, or IL) on first interaction. Cross-region transfer never occurs without explicit tenant configuration.

Penetration testing

Annual penetration test by an independent firm. Results reviewed by the security team within 30 days. Critical and high findings are remediated within 14 days of disclosure.

Vulnerability management

Dependency scanning on every CI build with Dependabot and Snyk. Container images scanned for CVEs before deployment. Critical CVEs patched within 48 hours.

Incident response

Documented incident response plan with defined severity levels, escalation paths, and customer notification timelines. Critical incidents trigger customer notification within 24 hours.

Questions about our security posture?

Our security team can provide the SOC 2 report, answer technical questions, and arrange a security review call for enterprise procurement.

Contact Security Team
Security | TorqueShift