Security at Core
Security isn't an afterthought—it's the foundation of our platform. We implement defense-in-depth strategies to protect your data at every layer.
SOC 2 Type II
GDPR
CCPA
HIPAA
Defense in Depth
Security Measures
Comprehensive protection at every layer of the stack.
Encryption at Rest & Transit
All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Database connections use SSL certificates.
- AES-256 encryption
- TLS 1.3
- SSL database connections
- Encrypted backups
SOC 2 Type II (In Progress)
We are working toward SOC 2 Type II certification with an independent auditor. Contact us for current status.
- Audit in progress
- Trust Service Criteria
- Status available on request
- Targeting 2026 completion
Infrastructure Security
Deployed on Google Cloud Platform with VPC isolation, WAF protection, and DDoS mitigation.
- GCP infrastructure
- VPC isolation
- Cloud Armor WAF
- Auto-scaling protection
Security Monitoring
Automated infrastructure monitoring with alerting and incident response procedures.
- Automated monitoring
- Alert pipelines
- Incident response plan
- Log aggregation
Security Testing
Continuous automated vulnerability scanning and dependency auditing across all services.
- Penetration testing planned
- Automated scanning
- Dependency auditing
- Bug bounty coming soon
Access Control
Strict access controls with MFA, principle of least privilege, and comprehensive audit logging.
- MFA required
- SSO integration
- Role-based access
- Privileged access management
Internal Practices
Organizational Security
Data Processing
We process customer data only as necessary to provide our services. Your data is never used for training AI models or shared with third parties.
- No data used for AI training
- Minimal data collection
- Right to deletion (GDPR/CCPA)
Data Retention
We retain data only as long as necessary to provide services. You can request deletion of your data at any time.
- Automated data purging
- 90-day log retention (configurable)
- Self-service data export
Responsible Disclosure
If you believe you've found a security vulnerability in VAIF Studio, please report it to us immediately. We investigate all reports and respond within 24 hours. We do not pursue legal action against good-faith security researchers.
security@vaif.studioPGP key available upon request