Security & Compliance

Enterprise-grade security.
Built for regulated institutions.

We protect your regulatory data with the same rigor we help you apply to compliance. Every control, every header, every line of code — auditable and transparent.

How Your Data is Protected

Every request that touches your data passes through five security layers. Here's what happens end-to-end.

1

Authentication & Edge Protection

Every request hits our middleware layer first. Unauthenticated users are redirected to login — no exceptions. Authenticated sessions use signed JWTs with role, organization, and tier embedded. Security headers (HSTS, CSP, X-Frame-Options) are applied to every response at the edge before it reaches your browser. Rate limiting blocks brute-force attempts on login and API endpoints.

2

Tenant Isolation & Authorization

After authentication, every database query is scoped to your organization ID. There is no global query in the system — it is architecturally impossible for one tenant to access another tenant's regulations, controls, findings, or reports. Role-based access control (Admin, Compliance Officer, Auditor, Executive) determines what actions each user can perform within their organization.

3

AI Processing with Zero Retention

When an AI agent runs — analyzing a regulation, finding gaps, drafting an exam response — your data is sent to Anthropic's Claude API over an encrypted connection. Claude processes the request and returns the result. Your data is never stored on Anthropic's servers beyond the processing window. It is never used to train or fine-tune any AI model. The data processing agreement with Anthropic guarantees this contractually.

4

Human Approval Before Action

AI agents in RegTwin don't act autonomously on critical decisions. When the Control Sentinel suggests new controls, they go into an approval queue — you review the title, description, evidence requirements, and mapping before anything is added. When the Audit Defender drafts a response letter, it passes through a multi-reviewer chain (preparer, reviewer, legal, CCO). The AI recommends. Humans decide.

5

Full Audit Trail — Every Decision Documented

Every AI agent decision is logged with the complete chain-of-thought reasoning — what data it retrieved, what it considered, what it concluded, and why. Every user action (approve, reject, edit, comment) is timestamped and attributed. The entire audit trail is exportable as CSV and JSON — a complete evidence package ready for regulators. When an examiner asks why a control was created or a response was drafted, the answer is already documented.

The result:Your regulatory data is encrypted at rest and in transit, isolated per organization, processed by AI with zero retention, gated by human approval, and documented with a complete chain-of-thought audit trail. Every layer is designed for the scrutiny of a regulatory examination — because that's exactly what our customers face.

Human-in-the-Loop Governance

AI agents recommend. Humans decide. Every agent action that modifies your compliance data is queued for human review and approval before execution.

Agent
What It Does
Writes to Database?
Human Approval
Regulatory Watchdog
Detects new regulations from Federal Register + agency feeds
Yes — new regulations
Queued for review
Regulatory Analyst
Parses regulation text, maps impact to your controls
No — read-only analysis
N/A (no writes)
Control Sentinel
Finds gaps, creates suggested controls
Yes — new controls
Queued for review
Audit Oracle
Predicts examination findings, generates evidence checklists
No — read-only predictions
N/A (no writes)
Report Architect
Generates board-ready compliance reports
No — generates text output
N/A (no writes)
Remediation Tracker
Creates action plans with milestones, owners, deadlines
Yes — plans + milestones
Queued for review
Audit Defender
Decomposes findings, drafts response letters
Yes — obligations + drafts
Multi-reviewer chain
Exam Simulator
Runs mock exams with AI examiner personas
Yes — exam sessions + scores
User-initiated (exam output)

Approval Queue

New regulations and remediation plans created by AI agents are placed in a pending approval queue. Compliance officers review the recommendation, then approve or reject with one click.

Multi-Reviewer Chain

Exam defense response letters pass through a sequential approval chain: preparer, reviewer, legal counsel, and CCO. Each reviewer approves independently before the response advances.

Full Audit Trail

Every approval decision is logged — who approved, when, and why. Rejections include the reason. The complete chain is exportable for regulatory examination.

Security Controls

Encryption

TLS 1.3 in transit, AES-256 at rest. All database connections require SSL. Passwords hashed with bcrypt (cost 12).

Access Control

Role-based access (Admin, Compliance Officer, Auditor, Executive). Google and Microsoft SSO. JWT session management.

Audit Logging

Every AI agent decision logged with full chain-of-thought reasoning. Immutable audit trail exportable as CSV/JSON.

Data Isolation

Multi-tenant architecture with org-scoped queries on every database operation. No cross-tenant data access possible.

Security Headers

HSTS, CSP, X-Frame-Options (DENY), X-Content-Type-Options, Referrer-Policy, Permissions-Policy on all responses.

Input Validation

Zod schema validation on all API endpoints. Parameterized queries via Drizzle ORM prevent SQL injection.

Rate Limiting

IP-based rate limiting on authentication, TTS, and public endpoints. Cron endpoints protected by secret tokens.

Error Sanitization

No internal details, stack traces, or schema information exposed in API error responses.

Infrastructure

Hosting: Vercel (SOC 2 Type II certified) — automatic scaling, DDoS protection, global edge network.

Database: Neon PostgreSQL — isolated instances, automated backups, point-in-time recovery, SSL-only connections.

AI Processing: Anthropic Claude API — data processing agreement in place. Your data is never used to train AI models. No persistent storage beyond the processing window.

Email: Resend — transactional email with DKIM and SPF verification on regtwinai.com domain.

Vulnerability Reporting

If you discover a security vulnerability, please report it responsibly to richard@regtwinai.com.

We commit to:

  • Acknowledging receipt within 24 hours
  • Providing an initial assessment within 72 hours
  • Keeping you informed of remediation progress
  • Crediting researchers who report responsibly

Please do not publicly disclose vulnerabilities before we've had an opportunity to address them.

Framework Alignment

RegTwin AI's security architecture is designed to align with the frameworks that matter most to regulated financial institutions.

SOC 2 Type II

In progress

Trust Services Criteria — Security, Availability, Processing Integrity, Confidentiality, Privacy

NIST CSF 2.0

Aligned

Govern, Identify, Protect, Detect, Respond, Recover — mapped to our security controls

FFIEC IT Handbook

Aligned

Information Security, Audit, Business Continuity — built for examiner scrutiny

ISO 27001

Aligned

Information security management system controls — Annex A controls mapped

Operational Security Policies

Documented procedures that govern how we operate, respond to incidents, retain data, and manage vendor relationships.

Incident Response Plan

Classification

P1 Critical: Data breach, unauthorized access, service-wide outage. Response: immediate. Escalation: CEO + all customers within 1 hour.

P2 High: Partial service degradation, suspected vulnerability, failed authentication anomaly. Response: within 1 hour. Escalation: engineering lead.

P3 Medium: Non-critical bug, performance degradation, single-user issue. Response: within 24 hours.

Response Procedure

  1. Detect — Automated monitoring (Vercel, Neon) + user reports to richard@regtwinai.com
  2. Contain — Isolate affected systems, revoke compromised credentials, disable affected endpoints
  3. Investigate — Root cause analysis using audit logs, database logs, and application traces
  4. Remediate — Deploy fix, verify resolution, restore service
  5. Notify — Affected customers notified within 72 hours per GDPR / state breach notification laws
  6. Review — Post-incident report within 5 business days. Lessons learned documented and controls updated.

Data Retention & Deletion Policy

Data TypeRetentionDeletion
User account dataDuration of accountSelf-service delete in Settings, or upon written request
Regulations & controlsDuration of organizationDeleted with organization
AI agent reasoning logs7 years (regulatory requirement)Automated purge after retention period
Audit trail7 years (regulatory requirement)Automated purge after retention period
Uploaded evidence filesDuration of associated findingDeleted when finding is removed or account deleted
Analytics events90 daysAutomated rolling deletion
Session tokens24 hoursAutomatic expiry
Database backups30 days (Neon)Automatic rotation by infrastructure

Right to deletion: Users can delete their account at any time from Settings. Account deletion removes all personal data, nullifies audit trail attribution, and deletes the organization if no other members remain. Deletion requests via email are processed within 5 business days.

Disaster Recovery

Application layer (Vercel): Multi-region deployment with automatic failover. Zero-downtime deployments with instant rollback. Global edge network ensures availability even during regional outages. 99.99% historical uptime.

Database (Neon PostgreSQL): Automated daily backups with point-in-time recovery up to 30 days. Database branching enables instant recovery to any point in time. Storage-level replication across availability zones.

Recovery objectives: RPO (Recovery Point Objective): < 1 hour. RTO (Recovery Time Objective): < 15 minutes for application, < 1 hour for full database restore.

Secrets management: All credentials stored in Vercel encrypted environment variables. No secrets in source code or version control. Rotation procedures documented for each credential type.

Vendor & Sub-processor Register

VendorPurposeData ProcessedCertifications
VercelApplication hosting & CDNApplication code, request logsSOC 2 Type II, ISO 27001
NeonPostgreSQL databaseAll application dataSOC 2 Type II
AnthropicAI processing (Claude)Regulation text, control data (transient)SOC 2 Type II, no training on customer data
ResendTransactional emailEmail addresses, notification contentSOC 2 Type II
ElevenLabsText-to-speech (marketing)Marketing narration text onlyNo customer data processed
Vercel BlobEvidence file storageUploaded documentsSOC 2 Type II (Vercel)

All vendors are evaluated annually for security posture, compliance certifications, and data handling practices. Data processing agreements are in place with all sub-processors that handle customer data.

SOC 2 Readiness

Transparent progress toward SOC 2 Type II certification across all five Trust Services Criteria.

96%

26 of 27 controls

Security

7/8 implemented
Encryption at rest and in transit
Implemented
Role-based access control
Implemented
Multi-factor authentication (SSO)
Implemented
Security headers (HSTS, CSP, etc.)
Implemented
Input validation and sanitization
Implemented
Rate limiting and DDoS protection
Implemented
Vulnerability scanning (automated dependency audits)
Implemented
Annual penetration testing
Planned

Availability

5/5 implemented
99.9% uptime SLA (Vercel infrastructure)
Implemented
Automated scaling and failover
Implemented
Database backups with point-in-time recovery
Implemented
Disaster recovery plan (Vercel + Neon automated)
Implemented
Incident response procedures
Implemented

Processing Integrity

4/4 implemented
Full audit trail on all AI decisions
Implemented
Chain-of-thought reasoning logged
Implemented
Human approval gates on AI actions
Implemented
Data validation on all inputs
Implemented

Confidentiality

5/5 implemented
Multi-tenant data isolation
Implemented
No AI training on customer data
Implemented
Secrets management via environment variables
Implemented
Data retention and deletion policy
Implemented
Vendor data processing agreements
Implemented

Privacy

5/5 implemented
Privacy policy published
Implemented
Email notification preferences
Implemented
Unsubscribe links in all emails
Implemented
Data export capability
Implemented
Right to deletion process (self-service)
Implemented

Policy Templates

Industry-standard policy templates for financial institutions. Use these as a starting point for your own compliance program.

Information Security Policy

Framework for protecting information assets, defining roles, and establishing security controls.

Sections included

  • Scope & Objectives
  • Roles & Responsibilities
  • Access Control
  • Data Classification
  • Incident Response
  • Acceptable Use
  • Review Cadence

Incident Response Plan

Step-by-step procedures for detecting, responding to, and recovering from security incidents.

Sections included

  • Incident Classification
  • Notification Matrix
  • Containment Procedures
  • Investigation & Root Cause
  • Communication Plan
  • Post-Incident Review
  • Lessons Learned

Data Retention & Deletion Policy

Defines how long data is retained, when it is deleted, and procedures for data subject requests.

Sections included

  • Retention Schedule by Data Type
  • Legal Hold Procedures
  • Automated Deletion Rules
  • Right to Deletion Workflow
  • Backup Retention
  • Audit Trail Retention
  • Annual Review

Vendor Risk Management Policy

Framework for assessing, monitoring, and managing risks from third-party service providers.

Sections included

  • Vendor Classification
  • Due Diligence Checklist
  • Security Questionnaire
  • Contract Requirements
  • Ongoing Monitoring
  • Incident Notification
  • Exit Strategy

Access Control Policy

Rules governing who can access what, how access is granted, and when it is revoked.

Sections included

  • Least Privilege Principle
  • Role Definitions
  • Access Request Process
  • Quarterly Access Reviews
  • Privileged Access Management
  • Termination Procedures
  • SSO & MFA Requirements

Change Management Policy

Procedures for requesting, reviewing, approving, and implementing changes to systems.

Sections included

  • Change Request Process
  • Impact Assessment
  • Approval Authority
  • Testing Requirements
  • Rollback Procedures
  • Emergency Change Process
  • Change Log

Questions about security?

We're happy to discuss our security posture, complete vendor questionnaires, or schedule a security review.