Audity is built for consultants handling sensitive client information. This page summarizes how we protect customer data today and the compliance milestones we are working toward over the next 24 months.
Request security questionnaire.Authentication is handled by Clerk. Multi-factor authentication is available to every user, sessions are managed with short-lived JWTs, and administrative routes are protected at the middleware layer. Feature-level access is enforced through a role and feature-flag system that is covered by a dedicated test suite.
Customer data is stored in Supabase Postgres in US regions. Row-Level Security is enabled on every tenant table and verified by an automated test suite. Data is encrypted at rest with AES-256 and in transit with TLS 1.2 or higher.
The application runs on Fly.io, which operates under SOC 2 Type II at the platform level. Environments are isolated and promoted through a controlled release process with containerized deployments.
All credentials are injected through environment variables. No secrets are stored in the codebase. Rotation procedures and an incident response playbook are documented internally and reviewed as posture evolves.
Inbound webhooks from Clerk and Stripe are verified by signature. API routes are protected and tested. Row-Level Security and feature-access tests run in CI on every change.
PostHog captures product events and errors. We commit to notifying affected customers within 24 hours of confirming a data breach, in line with our incident response playbook.
Supabase provides managed daily backups of the primary database. Restore procedures are tested as part of internal operations.
If you believe you have found a security issue, please email [email protected]. We acknowledge reports within one business day.
Audity relies on the following subprocessors to deliver the service. Each vendor is covered by its own terms and privacy commitments, and we review these as our compliance program matures.
| Subprocessor | Purpose | Data accessed | Region |
|---|---|---|---|
| Clerk | Authentication & MFA | Account credentials, session tokens | US |
| Supabase | Primary database & file storage | All customer data | US |
| Fly.io | Application hosting | Request logs, deployed code | US (Chicago) |
| Stripe | Payment processing | Billing info, payment methods | US / global |
| Paddle | Merchant of record & tax handling | Billing info, tax residency | US / global |
| Resend | Transactional email | Email address, message content | US |
| PostHog | Product analytics & session replay | Usage events, session recordings | US |
| OpenAI | LLM inference | Prompts and context | US |
| Anthropic | LLM inference | Prompts and context | US |
| Google Generative AI | LLM inference | Prompts and context | US |
| Mistral | LLM inference | Prompts and context | EU |
| N8N + Gamma | Workflow & presentation generation | Audit outputs | US / EU |
We are on a deliberate path toward formal certification. This roadmap reflects what we are working on today, not a marketing wish list.
No. Audity does not train models on customer data, and we do not opt into any provider training programs. AI providers process data according to their enterprise API terms.
All customer data is stored in US-based Supabase Postgres with Row-Level Security applied to every tenant table.
A formal DPA is on our compliance roadmap. Email [email protected] to discuss your requirements.
SSO is available on enterprise plans via Clerk, including Google and Microsoft out of the box. SAML is available on request.
You can export your data at any time. After cancellation, we delete your data on request in line with the Privacy Policy and any legal retention obligations.
Responsible disclosure reports go to [email protected]. We acknowledge within one business day.
For security questionnaires or responsible disclosure, reach out to us directly.
This page is updated as our security posture evolves. Last updated April 15, 2026.