TRUST CENTER · LAST UPDATED 2026-04-27

How we protect your data.

The frameworks, controls, and practices that keep customer data safe at Embedder.

FRAMEWORKS
SOC 2 Type II
IN PROGRESS
Continuous controls monitoring across infrastructure, identity, change management, and incident response.
GDPR
IN PROGRESS
Data subject rights, lawful basis records, processor agreements, and EU data transfer safeguards.
SECURITY PRACTICES
Encryption
Industry-standard TLS for data in transit and strong encryption at rest. Customer secrets are isolated in a managed secret store and never embedded in application code or images.
Access control
SSO with mandatory MFA. Production access is role-based, least-privilege, and time-bound. Privileged actions are reviewed and audited.
Monitoring & audit
Centralized audit logging across identity, secrets, and infrastructure. Real-time alerting on anomalous activity, with documented incident response runbooks.
Change management
Infrastructure and application changes go through peer review, automated checks, and a tested rollback path. No direct production access.
Vulnerability management
Automated dependency, code, and secret scanning on every change. Findings are tracked to remediation and dependencies are pinned for reproducible builds.
Backup & recovery
Continuous database backups with point-in-time recovery. Versioned object storage and tested restore procedures.
REPORTS & EVIDENCE
Request a report

Enterprise customers can request our latest SOC 2 report and a controls evidence summary under NDA. Reach out at [email protected].