PromptShield
Trust · pre-audit disclosure

Security & trust.

PromptShield exists to harden other companies\' LLM features under SOC 2 / ISO 42001 review — so our own posture has to clear the same bar. This page is the canonical answer to procurement and CISO questionnaires until our SOC 2 Type II is signed.

SOC 2 Type I

Audit window: 2026 Q4

ISO 42001

Gap analysis: 2026 Q3

DPA

Available pre-signature on request

Encryption

In transit & at rest

TLS 1.3 only on every public endpoint (HSTS, no downgrade). Customer-supplied auth tokens, scan results, and report PDFs are encrypted at rest with AES-256-GCM (Cloudflare R2 / managed KMS). No plaintext storage of credentials.

Access control

Least-privilege, auditable

Production access is gated by SSO + WebAuthn / hardware-key MFA. RBAC separates customer scan execution from billing and from infrastructure. All console + database access is logged to an append-only audit trail kept ≥ 12 months.

Scan data

Process in-memory, retain only the report

Raw prompts and endpoint responses are processed in-memory and discarded after report generation — they are never written to a database. Retention windows: 30 days (Free teaser PDF), 90 days (Starter / Team / Business PDFs). Auth tokens stored encrypted, deleted 30 days after contract end. Canonical retention table on /privacy.

Tenant isolation

Per-customer scope

Scan executions are isolated per tenant: separate execution sandboxes, scoped credentials, and namespaced storage. No customer can read another customer's scan inputs, outputs, or report artefacts. Test endpoints provided by customers are not shared between scan workers.

Authorisation guardrails

No scanning without consent

PromptShield only scans endpoints supplied by an authenticated, contracted customer. Default deny-list blocks .gov, .mil, and known critical-infrastructure domains. Acceptable Use Policy on /terms — customers warrant they have authority to test the target endpoint.

Incident response

security@promptshield.ai

Initial acknowledgement within 24 hours of report. Customer notification of any confirmed unauthorised data access within 72 hours, in line with Art. 33 DSGVO. Post-incident summary delivered to affected customers within 14 days.

Vulnerability disclosure

security@promptshield.ai (PGP on request)

Researchers may report vulnerabilities to security@promptshield.ai. We commit to (1) acknowledging within 48 hours, (2) not pursuing legal action against good-faith research conducted within a documented scope, (3) crediting researchers in the public advisory unless anonymity is requested. Full disclosure policy ships with the public bug-bounty programme (planned 2026 Q3).

Compliance posture

SOC 2 / ISO 42001 — in progress

PromptShield is purpose-built to produce evidence for SOC 2 Type II and ISO 42001 reviews. Our own SOC 2 Type I audit is targeted for 2026 Q4 (Type II 2027 Q2). Until then, this Security page + /privacy + /subprocessors form our authoritative pre-audit disclosure for procurement reviewers. Latest internal control narrative available under NDA on request.

Sub-processors

Listed transparently on /subprocessors

Every third party with potential access to customer data is listed on /subprocessors with name, region, purpose, and DPA reference. We notify enterprise customers ≥ 30 days before adding a new sub-processor with material data exposure.

Data residency

EU + US (Cloudflare global)

Public surface served from Cloudflare's global edge. Persistent storage in EU regions by default; US-residency available on Business plans on request. Cross-border transfers covered by SCCs and the EU-US Data Privacy Framework (Cloudflare adequacy).

Contact

Last reviewed: 26 April 2026 · v1