Security you can trust.
Your documents contain sensitive information. We protect them with enterprise-grade security, end-to-end encryption, and industry-leading compliance certifications.
COMPLIANCE
Certified and compliant
We maintain rigorous security standards and undergo regular third-party audits to ensure your data is protected.
SOC 2 Type II
GDPR
CCPA
ISO 27001
Our SOC 2 Type II report is available upon request under NDA. Contact our security team for access.
Request compliance documentationDATA_ENCRYPTION
End-to-end encryption
Your documents are encrypted at every stage, from upload to storage to retrieval.
Data at Rest
AES-256 encryption for all stored documents and metadata. Keys are managed through AWS KMS with automatic rotation.
Data in Transit
TLS 1.3 encryption for all API communications. Certificate pinning available for enterprise deployments.
Key Management
Customer-managed encryption keys (CMEK) available. Bring your own keys for complete control over data access.
INFRASTRUCTURE
Secure by design
Our infrastructure is built on AWS with security as a foundational principle. Every component is designed to protect your data.
- Multi-region deployment with automatic failover
- Private VPC isolation for enterprise customers
- DDoS protection and WAF at edge locations
- Automated security patching and updates
- 24/7 infrastructure monitoring and alerting
- Regular penetration testing by third parties
ACCESS_CONTROL
Fine-grained access
Control exactly who can access your documents and what they can do with them.
- Role-based access control (RBAC) with granular permissions
- Single Sign-On (SSO) via SAML 2.0 and OIDC
- Multi-factor authentication (MFA) enforcement
- Session management with configurable timeouts
- Audit logs for all user and API activity
- IP allowlisting for API access
Need complete control? Deploy on your infrastructure.
For organizations with strict data residency requirements, fluidzero can be deployed in your own cloud environment or on-premises. Your data never leaves your network.