Back to Interstrata
Security

Security at Interstrata

We build accountability infrastructure. That means our security posture has to be demonstrable, not just asserted. This page describes what we do, not what we aspire to.

Last updated: April 2026

Overview

SOC 2 Type II certifiedAES-256 at restTLS 1.2+ in transitDeny-by-default access

Interstrata provides accountability infrastructure for AI agents, autonomous systems, and enterprise workflows. Security is foundational to that mission. Every claim on this page is backed by our actual implementation, not a roadmap.

Infrastructure security

The foundation everything else runs on.

SOC 2 Type II Certified Infrastructure

Interstrata is hosted on Supabase's SOC 2 Type II audited cloud platform. Platform-level controls, audit cadence, and trust service criteria are inherited from the underlying infrastructure.

AES-256 Encryption at Rest

All stored data encrypted with AES-256 at the database level. Trust events, incident binders, and custody records are encrypted at rest without exception.

TLS 1.2+ In Transit

Every connection encrypted end-to-end. TLS 1.0 and 1.1 are disabled. All API endpoints enforce HTTPS.

Automated Daily Backups

Point-in-time recovery across all environments, managed by the underlying platform. Backup integrity is verified automatically.

24/7 Infrastructure Monitoring

Platform-level monitoring by Supabase's operations team. Alerting on anomalous access patterns, resource exhaustion, and service degradation.

Application security

How we protect data in the product layer.

Row-Level Security on Every Table

Database-enforced tenant isolation. Not application-level, database-level. Cross-tenant access is structurally prevented by PostgreSQL policies that execute before any query returns data.

Edge Function Isolation

Each API endpoint runs in its own sandboxed Deno runtime. No shared server state between tenant contexts. Functions are stateless and ephemeral.

Deny-by-Default Access Control

All capabilities default to denied. Access requires explicit grant: for user permissions, API access, and internal service-to-service calls. This is the same capability model we build into the product.

Zero Client-Side PII

No personally identifiable information written to client-side storage beyond scoped, short-lived session tokens. Widgets are display-only.

Full Audit Trail

Every write operation in production logged with a timestamped, hash-chained record. Audit records stored separately and not modifiable by application-layer operations. This is the same Trust Substrate primitive we sell.

Reporting security issues

If you discover a potential security vulnerability in Interstrata systems, please report it to security@interstrata.ai. We review all security reports and respond to confirmed vulnerabilities within 48 hours.

We do not pursue legal action against good-faith security researchers who report vulnerabilities to us directly before public disclosure.