Security at AIGov
Enterprise-grade security is not an add-on — it is built into every layer of our platform. Your governance data deserves nothing less.
Security Architecture
Multiple layers of protection for your organization's data.
Data Isolation
Every tenant is fully isolated using PostgreSQL Row Level Security (RLS) policies enforced at the database level. There is no way for one organization to query, view, or modify another organization's data.
Encryption
All data in transit is encrypted using TLS 1.2+. Data at rest is encrypted using AES-256 via our cloud infrastructure provider. Database backups are encrypted with the same standards.
Authentication
We use Google SSO (OAuth 2.0) for authentication. No passwords are stored on our servers. Users are automatically associated with their organization based on email domain, preventing unauthorized tenant access.
Role-Based Access Control
Six purpose-built roles (Public, Function Lead, Enterprise Lead, Security Reviewer, Legal Reviewer, Admin) ensure users only access what they need. Permissions are enforced server-side on every request.
Immutable Audit Logs
Every action in the platform is recorded in an append-only audit trail. Logs include the actor, action, timestamp, and affected resource. Audit data is retained for 7 years and exportable to CSV.
Rate Limiting
Per-user rate limits protect against abuse: 10 intake conversations per day and 50 chatbot messages per hour. API endpoints are protected against brute force and denial-of-service attacks.
Security Practices
How we build and operate the platform securely.
Secure Development
We follow secure coding practices including input validation, parameterized queries, output encoding, and dependency scanning. No client-side secret exposure.
Infrastructure Security
Hosted on enterprise-grade cloud infrastructure with automated patching, network isolation, DDoS protection, and continuous monitoring.
Monitoring & Incident Response
We maintain continuous monitoring for anomalous activity. Our incident response process includes detection, containment, eradication, recovery, and post-incident review.
Third-Party AI Providers
AI model providers process chatbot conversations under strict data processing agreements. Your data is not used to train third-party models. We evaluate provider security posture regularly.
Responsible Disclosure
If you discover a security vulnerability in AIGov, we encourage responsible disclosure. Please report it to our security team at support@technostica.com with a detailed description. We will acknowledge receipt within 48 hours and work to resolve confirmed issues promptly.
Questions About Security?
Our team is happy to answer any security questions or provide additional documentation for your review.
