Trust & Security
Security built into the architecture, not bolted on
TorqueShift handles sensitive customer conversations at enterprise scale. SOC 2 Type II, AES-256-GCM encryption, zero-trust access control, and immutable audit logs are standard — not optional add-ons.
Certifications
SOC 2 Type II
Annual audit by an independent AICPA-accredited firm covering Security, Availability, and Confidentiality trust service criteria. Report available under NDA to enterprise customers.
ISO 27001 alignment
Information security management system aligned to ISO 27001:2022. Full certification audit scheduled for Q4 2026.
GDPR Article 32 compliance
Technical and organisational measures implemented per Article 32. Data Processing Agreement available for EU customers on request.
Data Protection
Encryption at rest
All customer data is encrypted using AES-256-GCM with per-tenant key isolation. Encryption keys are managed in Azure Key Vault or AWS Secrets Manager, not co-located with data.
Encryption in transit
TLS 1.3 enforced for all API and SignalR connections. HSTS with a 1-year max-age and includeSubDomains. No TLS 1.1 or 1.2 fallback permitted.
PII masking
Phone numbers, email addresses, credit card patterns, IBANs, and national ID numbers are detected and masked in transcripts before storage. Raw audio is retained separately per your retention policy.
Field-level encryption for sensitive records
Sensitive CRM fields (phone, email, account numbers) are encrypted at the field level using AES-256-GCM with nonce-per-encrypt. Plaintext never appears in database dumps.
Access Control
Zero-trust architecture
Every API request is authenticated and authorised. No implicit trust based on network location. JWT tokens validated per request with tenant isolation enforced at the data layer.
Role-based access control
Granular permission matrices covering read, write, and admin operations. Permissions are enforced at the API layer, not only in the UI. Super-admin operations require MFA re-authentication.
SSO and SCIM provisioning
SAML 2.0 and OIDC integration with your identity provider. SCIM 2.0 for automated user lifecycle management. Deprovisioned users are immediately locked out across all sessions.
Immutable audit log
All privileged actions, authentication events, and data exports are written to an append-only audit log. The log is protected by a database trigger that prevents modification by any user, including admins.
Infrastructure
Multi-datacenter with data residency
Tenant data is pinned to a specific region (EU, US, or IL) on first interaction. Cross-region transfer never occurs without explicit tenant configuration.
Penetration testing
Annual penetration test by an independent firm. Results reviewed by the security team within 30 days. Critical and high findings are remediated within 14 days of disclosure.
Vulnerability management
Dependency scanning on every CI build with Dependabot and Snyk. Container images scanned for CVEs before deployment. Critical CVEs patched within 48 hours.
Incident response
Documented incident response plan with defined severity levels, escalation paths, and customer notification timelines. Critical incidents trigger customer notification within 24 hours.
Questions about our security posture?
Our security team can provide the SOC 2 report, answer technical questions, and arrange a security review call for enterprise procurement.
Contact Security Team