Security Policy
Our commitment to protecting your data | Last updated: 15 February 2026
Our Security Commitment
At AI Governance Hub, security is not an afterthought—it's fundamental to everything we build. We understand that you're trusting us with sensitive compliance data, and we take that responsibility seriously.
This page outlines our security practices, infrastructure, and policies. We believe in transparency and want you to understand exactly how we protect your data.
Security Principles
Security by Design
Security is built into every layer of our architecture from day one, not bolted on later.
Zero Trust Architecture
Every request is authenticated and authorized. No implicit trust based on network location.
Data Sovereignty
Your data is stored in UK/EU data centers and never transferred outside without your consent.
Proactive Monitoring
24/7 automated monitoring for security threats, anomalies, and potential breaches.
Infrastructure Security
Hosting and Network
- Hosting Provider: Vercel (Enterprise-grade infrastructure with SOC 2 Type II, ISO 27001)
- Database: Supabase (PostgreSQL) hosted in UK/EU data centers
- CDN: Global edge network with DDoS protection and WAF (Web Application Firewall)
- Uptime Target: 99.5% availability SLA
- Redundancy: Multi-region database replication and automated failover
Data Encryption
- At Rest: AES-256 encryption for all data stored in databases and file storage
- In Transit: TLS 1.2+ (HTTPS only, no insecure HTTP connections allowed)
- Backups: Encrypted backups taken every 24 hours, retained for 30 days
- Passwords: Bcrypt hashing (cost factor 12) with unique salts per user
Application Security
Authentication and Authorization
- Authentication: Supabase Auth with industry-standard JWT tokens
- Session Management: Secure, HTTP-only cookies with 24-hour inactivity timeout
- Password Requirements: Minimum 8 characters, complexity enforced
- Password Reset: Secure token-based reset with email verification
- Row-Level Security (RLS): Database-enforced access control ensuring users can only access their own data
- Role-Based Access Control (RBAC): Admin, Editor, Viewer roles with granular permissions
Input Validation and Sanitization
- Server-Side Validation: All user input validated using Zod schemas before processing
- XSS Protection: React's built-in escaping + Content Security Policy headers
- SQL Injection Prevention: Parameterized queries only, no raw SQL with user input
- CSRF Protection: SameSite cookies and anti-CSRF tokens
- File Upload Validation: Type checking, size limits (10MB), malware scanning (planned)
Security Headers
We enforce strict security headers on all HTTP responses:
- X-Frame-Options: DENY (prevents clickjacking)
- X-Content-Type-Options: nosniff (prevents MIME sniffing attacks)
- Referrer-Policy: strict-origin-when-cross-origin
- Permissions-Policy: Disables camera, microphone, geolocation
- Content-Security-Policy: Restricts script sources (planned for Phase 4)
Third-Party Security
Sub-Processors and Vendors
We carefully vet all third-party services that handle your data:
| Vendor | Purpose | Certifications |
|---|---|---|
| Supabase | Database, Auth, Storage | SOC 2 Type II, ISO 27001, GDPR |
| Stripe | Payment Processing | PCI-DSS Level 1, SOC 2, ISO 27001 |
| Vercel | Hosting, CDN | SOC 2 Type II, ISO 27001 |
| Resend | Transactional Email | GDPR-compliant |
| PostHog | Analytics | GDPR, SOC 2 (privacy-preserving) |
Access Controls
Employee Access
- Principle of Least Privilege: Team members have access only to systems necessary for their role
- Production Access: Strictly limited and logged. Database access requires multi-factor authentication
- Audit Logging: All administrative actions logged with timestamps and user identification
- Background Checks: Security-cleared personnel only (planned for Phase 5)
Customer Data Access
- We do NOT access your data without explicit permission
- Customer support access requires your written consent via support ticket
- All support access is logged and time-limited (24-hour expiry)
- You can revoke access at any time
Security Testing and Audits
Current Practices
- Automated Security Scanning: Dependency vulnerability scanning (GitHub Dependabot)
- Code Review: All code changes reviewed before deployment
- Automated Testing: 240+ unit tests, E2E tests, accessibility tests, security header tests
- OWASP Top 10: Regular testing against OWASP security risks (XSS, SQLi, CSRF, etc.)
Planned Audits (Phase 4-5)
- Penetration Testing: Annual third-party penetration tests (Q3 2026)
- SOC 2 Type II: Certification planned for 2027 (subject to revenue targets)
- Cyber Essentials Plus: UK government-backed certification (Q4 2026)
Incident Response
Security Incident Procedure
In the event of a security incident:
- Detection: Automated monitoring alerts our team immediately
- Containment: Affected systems isolated within 1 hour
- Investigation: Root cause analysis and impact assessment
- Notification: Affected customers notified within 72 hours (GDPR requirement)
- Remediation: Vulnerabilities patched and systems restored
- Post-Incident Review: Lessons learned and preventative measures implemented
Data Breach Notification
If a data breach affects your Personal Data, we will notify you via email within 72 hours, including:
- Nature of the breach
- Categories and approximate number of affected records
- Likely consequences
- Measures taken to address the breach
- Contact information for further inquiries
Backup and Disaster Recovery
- Backup Frequency: Automated daily backups at 02:00 UTC
- Retention: 30-day backup retention
- Encryption: All backups encrypted with AES-256
- Testing: Quarterly backup restore tests
- Recovery Time Objective (RTO): 4 hours
- Recovery Point Objective (RPO): 24 hours (last backup)
Compliance and Certifications
Current Compliance
- UK GDPR: Fully compliant (Data Processing Agreement available)
- Data Protection Act 2018: UK-specific requirements met
- WCAG 2.2 Level AA: Accessibility compliance
Planned Certifications
- Cyber Essentials Plus: Q4 2026
- SOC 2 Type II: 2027 (revenue-dependent)
- ISO 27001: 2027-2028 (long-term goal)
Responsible Disclosure
Vulnerability Reporting
We encourage responsible disclosure of security vulnerabilities. If you discover a security issue, please:
- Email security@aigovernancehub.uk with details
- Do NOT publicly disclose the vulnerability before we've had a chance to fix it
- Provide sufficient information to reproduce the issue
- Allow us 90 days to investigate and remediate before public disclosure
Bug Bounty Program
We do not currently offer a bug bounty program but plan to launch one in Phase 5 (June 2026). Responsible researchers who report valid vulnerabilities will be acknowledged in our Security Hall of Fame (with permission).
Your Security Responsibilities
Security is a shared responsibility. We ask that you:
- Use a strong, unique password for your account
- Enable multi-factor authentication when available (planned for Phase 4)
- Do not share your account credentials with others
- Log out from shared devices
- Report suspicious activity immediately
- Keep your devices and browsers up to date
Contact Security Team
For security-related inquiries, vulnerability reports, or incident notifications:
Email: security@aigovernancehub.uk
Address: AI Governance Hub, c/o ITNextGen Limited, 71-75 Shelton Street, Covent Garden, London, WC2H 9JQ
Expected Response Time: 24 hours for critical issues, 72 hours for non-critical inquiries
Policy Updates
This Security Policy may be updated to reflect changes in our security posture, infrastructure, or compliance requirements. Material changes will be communicated via email 30 days in advance.