Security

Security at AIGov

Enterprise-grade security is not an add-on — it is built into every layer of our platform. Your governance data deserves nothing less.

Security Architecture

Multiple layers of protection for your organization's data.

Data Isolation

Every tenant is fully isolated using PostgreSQL Row Level Security (RLS) policies enforced at the database level. There is no way for one organization to query, view, or modify another organization's data.

Encryption

All data in transit is encrypted using TLS 1.2+. Data at rest is encrypted using AES-256 via our cloud infrastructure provider. Database backups are encrypted with the same standards.

Authentication

We use Google SSO (OAuth 2.0) for authentication. No passwords are stored on our servers. Users are automatically associated with their organization based on email domain, preventing unauthorized tenant access.

Role-Based Access Control

Six purpose-built roles (Public, Function Lead, Enterprise Lead, Security Reviewer, Legal Reviewer, Admin) ensure users only access what they need. Permissions are enforced server-side on every request.

Immutable Audit Logs

Every action in the platform is recorded in an append-only audit trail. Logs include the actor, action, timestamp, and affected resource. Audit data is retained for 7 years and exportable to CSV.

Rate Limiting

Per-user rate limits protect against abuse: 10 intake conversations per day and 50 chatbot messages per hour. API endpoints are protected against brute force and denial-of-service attacks.

Security Practices

How we build and operate the platform securely.

Secure Development

We follow secure coding practices including input validation, parameterized queries, output encoding, and dependency scanning. No client-side secret exposure.

Infrastructure Security

Hosted on enterprise-grade cloud infrastructure with automated patching, network isolation, DDoS protection, and continuous monitoring.

Monitoring & Incident Response

We maintain continuous monitoring for anomalous activity. Our incident response process includes detection, containment, eradication, recovery, and post-incident review.

Third-Party AI Providers

AI model providers process chatbot conversations under strict data processing agreements. Your data is not used to train third-party models. We evaluate provider security posture regularly.

Responsible Disclosure

If you discover a security vulnerability in AIGov, we encourage responsible disclosure. Please report it to our security team at support@technostica.com with a detailed description. We will acknowledge receipt within 48 hours and work to resolve confirmed issues promptly.

Questions About Security?

Our team is happy to answer any security questions or provide additional documentation for your review.