Security at Cascade AI

Security and data protection are at the core of everything we do. We implement industry-leading security practices to protect your data and ensure the integrity of our platform.

Last updated: January 12, 2025

Encryption

End-to-end encryption for data in transit and at rest

Data Protection

Secure infrastructure with regular backups and redundancy

Monitoring

24/7 security monitoring and threat detection

Compliance

SOC 2, GDPR, and industry standards compliance

Infrastructure Security

Cloud Infrastructure

Our platform is hosted on industry-leading cloud infrastructure with enterprise-grade security:

  • Multi-region deployment with automatic failover capabilities
  • DDoS protection and advanced threat mitigation
  • Regular security patches and updates
  • Infrastructure as Code (IaC) for consistent and secure deployments
  • Network segmentation and isolation between customer environments

Physical Security

Our cloud providers maintain state-of-the-art data centers with:

  • 24/7 physical security and surveillance
  • Biometric access controls
  • Environmental controls and redundant power systems
  • Regular security audits and compliance certifications

Data Security

Encryption

  • In Transit: All data transmitted to and from our platform is encrypted using TLS 1.3 with strong cipher suites
  • At Rest: All stored data is encrypted using AES-256 encryption
  • Database Encryption: Database-level encryption with encrypted backups
  • Key Management: Cryptographic keys are managed using industry-standard key management systems

Data Isolation

We implement multi-tenancy with strict data isolation:

  • Logical separation of customer data in databases
  • Row-level security and access controls
  • Dedicated vector databases for knowledge base embeddings
  • No cross-tenant data sharing or access

Data Retention and Deletion

  • Customer data is retained according to your subscription and legal requirements
  • Secure deletion processes ensure data is permanently removed upon request
  • Automated backup retention policies with encrypted backups
  • 90-day deletion window after account termination

Access Control and Authentication

User Authentication

  • Secure password requirements with complexity enforcement
  • Multi-factor authentication (MFA) available for all accounts
  • Single Sign-On (SSO) support for enterprise customers
  • Session management with automatic timeout
  • Secure token-based authentication with scope-based permissions

Role-Based Access Control (RBAC)

  • Granular permission controls for team members
  • Principle of least privilege access
  • Audit logs for all user actions and data access
  • Admin controls for managing team permissions

Internal Access Controls

  • Strict employee access controls with need-to-know basis
  • Background checks for all employees with system access
  • Regular access reviews and revocations
  • Separate development, staging, and production environments

Application Security

Secure Development Practices

  • Security-first development lifecycle (SDL)
  • Code reviews with security focus
  • Automated security scanning in CI/CD pipeline
  • Dependency vulnerability scanning and updates
  • Regular security training for development team

Vulnerability Management

  • Regular penetration testing by third-party security firms
  • Bug bounty program for responsible disclosure
  • Vulnerability scanning and patch management
  • Security incident response plan and procedures

Application Security

  • Rate limiting and throttling to prevent abuse
  • Input validation and sanitization
  • Protection against common attacks (SQL injection, XSS, CSRF)
  • Secure request handling and response validation

Monitoring and Incident Response

Security Monitoring

  • 24/7 security monitoring and threat detection
  • Real-time alerting for suspicious activities
  • Comprehensive logging of all system events
  • Intrusion detection and prevention systems (IDS/IPS)
  • Security Information and Event Management (SIEM)

Incident Response

We maintain a comprehensive incident response plan:

  • Dedicated security team available 24/7
  • Defined incident classification and escalation procedures
  • Communication protocols for customer notification
  • Post-incident analysis and remediation
  • Regular incident response drills and testing

Business Continuity and Disaster Recovery

Backup and Recovery

  • Automated daily backups with encryption
  • Multi-region backup replication
  • Regular backup restoration testing
  • Point-in-time recovery capabilities
  • Documented recovery time objectives (RTO) and recovery point objectives (RPO)

High Availability

  • 99.9% uptime SLA for enterprise customers
  • Auto-scaling infrastructure for handling traffic spikes
  • Load balancing across multiple availability zones
  • Automatic failover mechanisms

Employee Security and Training

  • Background checks for all employees with access to customer data
  • Security awareness training for all employees
  • Regular phishing and social engineering tests
  • Strict confidentiality and non-disclosure agreements
  • Secure device management and endpoint protection
  • Immediate access revocation upon employee departure

Responsible Disclosure

We value the security research community and encourage responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to us:

Security Contact

Email: security@cascade.ai

PGP Key: Available upon request

Please include detailed information about the vulnerability and steps to reproduce it. We commit to responding within 48 hours and will work with you to understand and address the issue.

Bug Bounty Program

We maintain a bug bounty program to reward security researchers who help us improve our security posture. Rewards are based on the severity and impact of reported vulnerabilities. Contact us for program details.

Certifications and Compliance

We maintain industry-standard certifications and compliance frameworks:

  • SOC 2 Type II certification (annual audit)
  • GDPR compliance for European data protection
  • CCPA compliance for California privacy rights
  • ISO 27001 information security management (in progress)

For more details on our compliance programs, visit our Compliance page.

Security Questions?

If you have questions about our security practices or need to report a security concern:

Security Team: security@cascade.ai

General Inquiries: support@cascade.ai

Enterprise Security: enterprise@cascade.ai