Security
Your data protection is our top priority. Every layer of AdaptDay is built with security at its foundation — not bolted on after the fact.
Security at every layer.
From infrastructure to application logic, AdaptDay implements defense-in-depth security controls that enterprise buyers expect.
Infrastructure
99.99% uptime SLAHosted on Vercel's edge network with automatic DDoS protection, global CDN distribution, and enterprise-grade uptime SLAs. Every request is served from the nearest edge location for minimal latency and maximum resilience.
Database Security
AES-256 + TLS 1.3Powered by Neon PostgreSQL with AES-256 encryption at rest and TLS 1.3 encryption in transit. Automated backups with point-in-time recovery. Connection pooling with secure credential rotation.
Authentication
SOC 2 Type II certifiedClerk provides SOC 2 Type II certified authentication with multi-factor authentication (MFA), secure session management, brute-force protection, and bot detection. Sessions are short-lived and automatically rotated.
Data Isolation
Zero cross-tenant leakageEvery database table includes a tenant_id column. Every query is scoped to the authenticated tenant. There is zero possibility of cross-tenant data leakage — isolation is enforced at the data layer, not the application layer.
Audit Trail
Append-only, immutableEvery create, update, and delete operation is logged in an append-only audit_logs table. Each entry records the user, timestamp, resource type, action, and full before/after values. Audit logs cannot be modified or deleted — ever.
Access Control
Granular RBACRole-based access control (RBAC) with five system roles plus support for custom roles. Permissions are granular — scoped by resource type, action, and organizational scope. RBAC checks are enforced in domain services, not the UI.
Encryption
End-to-end encryptionAll data is encrypted at rest using AES-256 and in transit using TLS 1.3. Encryption keys are managed through secure key management infrastructure. Sensitive fields like SSN and government IDs receive additional application-layer encryption.
Compliance Ready
SOC 2 + GDPR readyBuilt-in compliance module with document retention policies, policy acknowledgment tracking, certification management, and expiration monitoring. Designed to support SOC 2, GDPR, and employment law requirements out of the box.
How your data flows — securely.
Every step from browser to database is encrypted and access-controlled.
Client
HTTPS only, secure cookies, CSRF protection
Edge Network
Vercel CDN, DDoS mitigation, WAF
Auth Layer
Clerk MFA, session validation, token verification
App Server
RBAC enforcement, tenant scoping, audit logging
Database
Neon PostgreSQL, AES-256, tenant isolation
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly. Do not disclose the vulnerability publicly until we have had a chance to address it.
Report security vulnerabilities to jamie@adaptensor.com with "Security" in the subject line.
Questions about security?
We are happy to discuss our security practices, provide additional documentation, or answer questions from your security team.