Trust Center

Security, compliance, and the operating principles behind Purogaly.

Purogaly is the runtime enforcement and evidence pipeline for AI agents. This page describes how we secure customer data, the compliance frameworks we map to, our sub-processors, and how to reach our security team.

Last updatedApril 27, 2026
01 — Security Architecture

How customer data is protected

Purogaly is built on Supabase (Postgres) and deployed on Vercel. All customer data is isolated per tenant, encrypted in transit and at rest, and access is audited at the database level.

Encryption in transit

TLS 1.3 enforced on all public endpoints. HSTS preload-eligible.

Encryption at rest

AES-256 on the underlying Supabase Postgres storage layer.

Tenant isolation

Row-level security enforced on every public-schema table. No tenant can read another tenant's data through any API path.

Authentication

SAML 2.0 SSO via WorkOS for enterprise tenants. Email + password with bcrypt for self-serve. Per-org enforcement.

Authorization

Role-based access control with owner / admin / member / viewer roles. Permission boundaries enforced at the database, not just the application layer.

API key handling

Customer API keys stored as SHA-256 hashes. Plaintext is shown once at creation and never retrievable thereafter.

Tamper-evident audit log

Every governance event SHA-256 hash-chained to the previous event. Append-only at the database trigger level. Two layers of enforcement (grant + trigger).

Independent verification

Open-source CLI verifier lets auditors cryptographically validate evidence bundles offline, without trusting Purogaly's database.

Webhook signing

Outbound events to customer SIEMs signed with HMAC-SHA256, per-destination secrets, rotatable on demand.

Rate limiting

Sliding-window per-API-key rate limits on every public endpoint. Configurable per tenant.

02 — Compliance Status

Frameworks we map to

Purogaly maps governance events to specific controls across four frameworks. Status below is current as of April 27, 2026. We don't claim certifications we haven't earned.

FrameworkCoverageStatusNotes
NIST AI RMF 1.072 of 72 subcategoriesMappedVerbatim from official NIST source. Every governed action can be tied to specific GOVERN/MAP/MEASURE/MANAGE subcategories.
EU AI Act28 article-level controlsMappedCovers Chapters III, IV, V, IX. Article 14 (human oversight) is the architectural primitive of the product.
SOC 2 (AICPA TSC 2017)33 Common Criteria + Availability + ConfidentialityType II in progressControls implemented and documented. Audit engagement target: Q4 2026.
ISO 27001:202279 controls — Annex A.5, A.6, A.8ImplementingAnnex A.7 (Physical) deferred — infrastructure provider responsibility for cloud-only SaaS.
GDPR / UK GDPRDPA available on requestCompliantData Processing Agreement available under NDA. EU customer data resident in EU regions on request.
03 — Sub-processors

Third parties processing customer data

Purogaly relies on the following sub-processors to provide the service. We notify customers in advance of any material changes to this list.

Sub-processorPurposeData handledRegion
SupabaseDatabase, authentication, storageAll customer dataUS (default), EU available
VercelApplication hosting and edge deliveryRequest metadata, no persistent customer dataGlobal edge
WorkOSSAML SSO and Directory SyncUser identity profiles for SSO-enabled tenantsUS
ResendTransactional email (approval notifications, invitations)User email addresses, notification contentUS, EU
04 — Operations

Availability and incident handling

Purogaly is in active production. We're honest about what's in place today and what's on the roadmap.

CapabilityStatusDetail
Automated backupsIn placeDaily Postgres backups via Supabase. Point-in-time recovery on Pro tier.
Audit log retentionIn placeMinimum two years per tenant. Configurable for enterprise tier.
Incident responseIn placeDocumented runbook. 24-hour notification commitment for confirmed security incidents affecting customer data.
Public status pageRoadmapLive status page launches alongside SOC 2 Type II.
Published SLARoadmap99.9% target for platform tier — to be published once SOC 2 Type II is complete.
Third-party penetration testRoadmapEngagement scheduled to coincide with SOC 2 Type II audit window.
05 — Contact

Reaching our security team

For security disclosures, compliance questions, or DPA requests, use the appropriate channel below. Responsible disclosure is welcomed and acknowledged within one business day.

Security disclosuressecurity@purogaly.com
Privacy and DPA requestsprivacy@purogaly.com
Legal and contractslegal@purogaly.com
General inquiriescontact@purogaly.com