All customer data is encrypted in transit using industry-standard TLS encryption. Data stored within production systems is encrypted at rest using encryption mechanisms provided by our cloud providers.
Cascade Security Inc.
This document outlines the security practices and controls implemented by Cascade Security Inc. to protect customer data and systems. Cascade Security Inc. is an AI infrastructure company that builds post-deployment infrastructure for AI agents, including monitoring, safety, reliability, and evaluation systems.
All customer data is encrypted in transit using industry-standard TLS encryption. Data stored within production systems is encrypted at rest using encryption mechanisms provided by our cloud providers.
Production infrastructure is hosted on AWS with frontend services deployed via Vercel. Access to infrastructure is restricted using role-based access controls and secured configurations. Network-level protections and logging are enabled to monitor system activity.
Access to systems and code repositories is limited to authorized personnel based on job responsibilities. Multi-factor authentication is enforced where supported. Access reviews are conducted periodically.
Source code is managed through GitHub with controlled access and code review processes. Changes to production systems follow documented deployment and review procedures.
Cascade Security Inc. maintains an incident response process for identifying, responding to, and remediating security events. Incidents are documented and escalated according to severity, with post-incident reviews conducted when applicable.
Cascade Security Inc. is pursuing SOC 2 compliance and maintains internal policies aligned with industry best practices. Security controls are reviewed periodically to ensure continued effectiveness.
Ownership of this document is assigned to company leadership. The content is reviewed periodically and updated to reflect changes in infrastructure, policies, or compliance posture.