Enterprise-Grade Security

Security

Your data protection is our top priority. Every layer of AdaptDay is built with security at its foundation — not bolted on after the fact.

AES-256
Encryption at rest
TLS 1.3
Encryption in transit
100%
Tenant isolation
Immutable
Audit logs

Security at every layer.

From infrastructure to application logic, AdaptDay implements defense-in-depth security controls that enterprise buyers expect.

Infrastructure

99.99% uptime SLA

Hosted on Vercel's edge network with automatic DDoS protection, global CDN distribution, and enterprise-grade uptime SLAs. Every request is served from the nearest edge location for minimal latency and maximum resilience.

Database Security

AES-256 + TLS 1.3

Powered by Neon PostgreSQL with AES-256 encryption at rest and TLS 1.3 encryption in transit. Automated backups with point-in-time recovery. Connection pooling with secure credential rotation.

Authentication

SOC 2 Type II certified

Clerk provides SOC 2 Type II certified authentication with multi-factor authentication (MFA), secure session management, brute-force protection, and bot detection. Sessions are short-lived and automatically rotated.

Data Isolation

Zero cross-tenant leakage

Every database table includes a tenant_id column. Every query is scoped to the authenticated tenant. There is zero possibility of cross-tenant data leakage — isolation is enforced at the data layer, not the application layer.

Audit Trail

Append-only, immutable

Every create, update, and delete operation is logged in an append-only audit_logs table. Each entry records the user, timestamp, resource type, action, and full before/after values. Audit logs cannot be modified or deleted — ever.

Access Control

Granular RBAC

Role-based access control (RBAC) with five system roles plus support for custom roles. Permissions are granular — scoped by resource type, action, and organizational scope. RBAC checks are enforced in domain services, not the UI.

Encryption

End-to-end encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Encryption keys are managed through secure key management infrastructure. Sensitive fields like SSN and government IDs receive additional application-layer encryption.

Compliance Ready

SOC 2 + GDPR ready

Built-in compliance module with document retention policies, policy acknowledgment tracking, certification management, and expiration monitoring. Designed to support SOC 2, GDPR, and employment law requirements out of the box.

How your data flows — securely.

Every step from browser to database is encrypted and access-controlled.

1

Client

HTTPS only, secure cookies, CSRF protection

2

Edge Network

Vercel CDN, DDoS mitigation, WAF

3

Auth Layer

Clerk MFA, session validation, token verification

4

App Server

RBAC enforcement, tenant scoping, audit logging

5

Database

Neon PostgreSQL, AES-256, tenant isolation

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly. Do not disclose the vulnerability publicly until we have had a chance to address it.

Report security vulnerabilities to jamie@adaptensor.com with "Security" in the subject line.

Questions about security?

We are happy to discuss our security practices, provide additional documentation, or answer questions from your security team.