Security Overview & Data Protection Practices

Cascade Security Inc.

This document outlines the security practices and controls implemented by Cascade Security Inc. to protect customer data and systems. Cascade Security Inc. is an AI infrastructure company that builds post-deployment infrastructure for AI agents, including monitoring, safety, reliability, and evaluation systems.

Data Encryption

All customer data is encrypted in transit using industry-standard TLS encryption. Data stored within production systems is encrypted at rest using encryption mechanisms provided by our cloud providers.

Infrastructure Security

Production infrastructure is hosted on AWS with frontend services deployed via Vercel. Access to infrastructure is restricted using role-based access controls and secured configurations. Network-level protections and logging are enabled to monitor system activity.

Access Control

Access to systems and code repositories is limited to authorized personnel based on job responsibilities. Multi-factor authentication is enforced where supported. Access reviews are conducted periodically.

Secure Development Practices

Source code is managed through GitHub with controlled access and code review processes. Changes to production systems follow documented deployment and review procedures.

Incident Response

Cascade Security Inc. maintains an incident response process for identifying, responding to, and remediating security events. Incidents are documented and escalated according to severity, with post-incident reviews conducted when applicable.

Compliance & Assurance

Cascade Security Inc. is pursuing SOC 2 compliance and maintains internal policies aligned with industry best practices. Security controls are reviewed periodically to ensure continued effectiveness.

Document Ownership & Maintenance

Ownership of this document is assigned to company leadership. The content is reviewed periodically and updated to reflect changes in infrastructure, policies, or compliance posture.