Security

Security designed for financial services trust, not security theater.

sEyeber Hub is designed around read-only discovery, organization-scoped isolation, least-privilege access, and a vendor stack chosen for strong security controls. Our objective is to help firms understand risk without creating new operational risk.

Built for financial services first, with security expectations shaped by Regulation S-P pressure and enterprise buyer diligence.
Security Principles

How sEyeber Hub is designed to reduce risk while discovering it.

The platform security model is built to minimize blast radius, avoid unnecessary privileges, and keep one customer organization's data logically separate from another's.

Read-only discovery by default

sEyeber Hub is designed to request read-only connector scopes wherever supported so it can observe security posture without changing settings, deploying policies, or writing back into customer environments.

Least privilege No writeback required
Organization-scoped isolation

Each customer organization is designed to operate inside its own tenant boundary with separate access control, data storage boundaries, and processing context so firms are not exposed to each other's scan data.

Tenant separation Org-based access control
Admin and audit control

Because subscriptions are organization-based, admin access, billing access, connector management, and operational actions are designed to align with organization roles instead of being tied permanently to one individual user.

Organization billing Role-aware administration
Data minimization and controlled retention

The product is intended to retain only the data needed to deliver discovery, evidence, mappings, and mitigation workflows, rather than collecting broad unnecessary datasets that expand customer risk.

Need-to-know storage Retention discipline

AI security and privacy model

sEyeber Hub is being designed to use organization-scoped AI processing contexts. In practice, that means a firm's scan inputs, retrieved evidence, prompts, intermediate artifacts, and generated outputs are intended to stay within that firm's own processing boundary rather than being reused as context in another firm's scan workflow. Planned AI controls include strict tenant scoping for retrieval, least-privilege human access to outputs, minimized prompt logging, secrets isolation, and a policy that customer scan data should not be used to train shared models unless the customer explicitly opts in.

Platform Controls

Product-level controls that matter in due diligence.

These are the security concepts prospects typically ask about when reviewing a cybersecurity platform for financial services use.

Secrets and token handling

Connector credentials, API tokens, and other sensitive secrets should be stored encrypted, tightly scoped, revocable, and inaccessible to unauthorized users or downstream customers.

Transport and storage encryption

Customer data should be protected in transit and at rest throughout the application stack, including application traffic, internal services traffic, and database storage layers.

Operational logging and monitoring

Administrative actions, connector changes, authentication events, and security-relevant workflow actions should be auditable so organizations can review how the platform is being used.

Vulnerability management and change discipline

Infrastructure and application components should be maintained with timely patching, secure code review, dependency hygiene, and controlled deployment practices.

Vendor Foundations

Security capabilities in the underlying platform stack.

The following capabilities are based on vendor-documented security materials for our current stack architecture as of April 12, 2026.

Stripe

Stripe underpins billing and subscriptions so payment-card handling can stay inside a mature payments-security environment rather than being recreated inside the core application.

PCI Service Provider Level 1 SOC 1 / SOC 2 Type II Public SOC 3 TLS 1.2+ mTLS for server-to-server traffic AES-256 at rest for card numbers MFA / SAML SSO Restricted keys and audit logs
Netlify

Netlify serves the static marketing surface with a reduced attack surface, encrypted traffic, enterprise access controls, and built-in DDoS protections at the edge.

TLS 1.2 minimum AES-256 at rest and in transit Free HTTPS certificates L3 / L4 / L7 DDoS mitigation SAML SSO / SCIM / RBAC Firewall traffic rules SOC 2 Type 2 ISO 27001 / ISO 27018 / PCI DSS / HIPAA
Fly.io

Fly.io runs the FastAPI backend with hardware isolation, encrypted networking, internal service protection, and secure storage primitives designed for cloud infrastructure.

No shared kernels Firecracker virtualization WireGuard private networking BPF-based access controls Mutual TLS for internal services DDoS mitigation LUKS-encrypted volumes and databases SSO and phishing-resistant 2FA for internal access
Neon

Neon provides the PostgreSQL layer with strong compliance posture, database security features, and support for read-only compute patterns that fit least-privilege design.

SOC 2 / SOC 3 ISO 27001 / ISO 27701 GDPR / CCPA / HIPAA Access monitoring and backups Disk encryption EDR / MDM IDS / IPS / SIEM Anti-DDoS One read-write endpoint, multiple read-only endpoints
Security Positioning

What we want prospects to understand quickly.

Discovery without control-plane risksEyeber Hub is designed to discover security posture with read-only purview rather than by taking over customer environments.
AI data does not belong in a shared poolCustomer scan data should stay inside the customer's own organizational boundary, not become context for other firms' AI outputs.
Payments stay in StripeUsing Stripe helps keep card-data handling in a PCI-hardened environment outside the core application.
Stack choices support trust conversationsNetlify, Fly.io, and Neon contribute documented controls that help support buyer diligence and security questionnaires.

Security FAQ

Security questions buyers ask most

A few high-frequency questions from this page’s topic. For the full list, see the FAQ.

How is one customer's scan data kept separate from another's?

Each customer organization is designed to operate inside its own tenant boundary in the sEyeber Hub data model — separate access control, storage scope, and AI processing context. One firm's scan inputs, evidence, prompts, and generated outputs are not used as context for another firm's workflows.

Do you train AI models on customer data?

No — not by default. AI is used to suggest questionnaire answers, draft narratives, and propose remediation language, with processing scoped to the customer organization. Customer scan data is not used to train shared models unless the customer explicitly opts in.

What vendors back the platform, and why does that matter?

The app runs on Fly.io, data lives in Neon (PostgreSQL), the marketing site runs on Netlify, and payments are processed by Stripe. Each vendor carries documented SOC 2 / ISO 27001 posture so buyer-diligence conversations reference third-party controls rather than self-attested ones.