Enterprise-grade security by default — protecting your documents, your team, and your clients.
Every workspace is fully isolated at the database level using row-level security. Your documents, users, and search results are scoped to your workspace on every read and write — there is no admin override in the application. Search results are filtered by workspace before they ever reach the AI.
All traffic between you, our servers, and our partners runs over TLS 1.3 with modern cipher suites. Certificate management is handled by industry-leading providers.
Uploaded files and database records are encrypted at rest with AES-256 across every storage layer — the baseline every enterprise SaaS ships.
On top of the at-rest baseline, we apply a second layer of AES-256-GCM encryption to the content we use for AI search, using a key that is unique to your workspace and derived from a master key held in our secrets store.
User authentication is handled by Clerk, a SOC 2 Type II certified identity provider. Sessions use short-lived, rotated tokens. Only members you invite can access your workspace, and every request is checked against workspace membership at the database level.
We use OpenAI, Anthropic, and Google models via enterprise APIs with zero-retention and no-training terms. Your documents and queries are never used to train any foundation model.
Every upload, query, membership change, and access event is recorded in a workspace-scoped audit log. Enterprise and Custom plans include audit log export to your own security tools.
Have stricter requirements? Single sign-on (SSO/SAML), custom-managed encryption keys, on-premise deployment, and dedicated data residency are all available on the Custom tier. Talk to sales and we'll scope it against your security requirements.
We act as a data processor for customer content and support customer obligations under the GDPR and UK GDPR. Access, rectification, and deletion requests are honored within 30 days. Our Data Processing Agreement (with Standard Contractual Clauses) and sub-processor list are available online.
We do not sell or share personal information as those terms are defined under the California Consumer Privacy Act and California Privacy Rights Act. California residents' rights are described in our Privacy Policy.
Our architecture is built on the same controls required by enterprise security standards — access management, audit logging, incident response, and change management. We work actively with customers going through their own vendor security reviews.
Available as scoped engagements on the Custom tier. If your deal requires one of these, we'll price the certification work alongside your contract.
Primary infrastructure is hosted in the US. EU region is available on Scale, Enterprise, and Custom plans — contact sales.
Found a vulnerability? We'd like to hear about it before an attacker does. Email security@docsflow.app with reproduction steps. We commit to:
We keep the following ready to send within one business day:
Email sales@docsflow.app with your timeline and we'll route the right information.