Legal
Security is at the core of what we do — we're a compliance platform, so we hold ourselves to the same standards we help our customers achieve.
Last updated: March 10, 2026
AuditPath is built to handle sensitive compliance data. We implement security controls aligned with SOC 2 Type II criteria — the same standard we help our customers achieve. This page documents our security practices transparently.
If you are a security researcher and have found a vulnerability, please see the Report a Vulnerability section below.
AuditPath runs entirely on Amazon Web Services (AWS) in the Asia Pacific (Mumbai) region (ap-south-1), keeping customer data within India by default.
AuditPath enforces four role tiers with granular permissions:
Every role has access only to what it needs. Role checks are enforced at both the API layer (Spring Security @PreAuthorize) and the database layer (Row-Level Security policies).
Every customer organisation is completely isolated from others at the database level using PostgreSQL Row-Level Security (RLS). Every table that contains customer data includes an org_id column and a corresponding RLS policy.
The current organisation's ID is set as a session variable on every database connection before any query executes. This means it is architecturally impossible for one organisation to read or modify another organisation's data, even if there were an application-level bug.
When you connect your AWS account to AuditPath, we use a cross-account IAM role with the following security controls:
In the event of a security incident affecting customer data, we commit to:
We take security reports seriously. If you discover a vulnerability in AuditPath, please disclose it responsibly:
We do not currently offer a bug bounty programme, but we will publicly acknowledge responsible disclosures (with your permission) and work with you in good faith to resolve any issues quickly.