Client Data Security
·Enforced
Your data stays yours. We keep only what you save, and we never sell, share, or train models on it.
Tenant-isolated queries · TLS 1.2+ in transit · AES-256 at rest · HMAC-signed session cookies · scoped OAuth tokens you can revoke · least-privilege access · immutable audit trail · point-in-time restore on Neon · Anthropic zero-training on all AI calls (zero-retention upgrade requested). Aligned with SOC 2 control families and NIST 800-53 guidance. One-click purge under Settings → Danger Zone.
Compliance
How we protect your financial data
NOESIS CFO is a B2B FinTech SaaS built for operators and fractional CFOs. This page is a candid summary of what is live today, what is available on request, and what is still on the roadmap. If you are filling out a vendor questionnaire, emailsupport@noesiscfo-io.usand we will turn it around fast.
Last reviewed 2026-04-19. Companion pages: Privacy · Terms · Data Handling · Disclosures
Tenant isolation
LiveEvery Organization-scoped query runs through resolveOrgForSession / resolveOrgScope. Cross-tenant bypasses (including founder-admin escapes) are automatically blocked by the noesis-review audit script on every commit.
AGENTS.md, lib/security/org-scope.ts
Encryption in transit & at rest
LiveAll user traffic is TLS 1.2+ (HSTS preload in production). Primary datastore is Neon managed Postgres with storage-level AES-256 encryption. Secrets are stored in Vercel encrypted environment variables, never in the repo.
next.config.ts security headers, Neon platform
No-retention posture + self-serve purge
LiveCustomer financial data is only kept while actively in use. Any signed-in user can purge all workspace content immediately from Settings > Profile. The purge runs in a single atomic transaction with password step-up, typed email confirmation, and a confirmation email to the account on file. Operational backups are purged within 30 days.
/api/user/purge-data, /legal/data-handling
Stripe SAQ A scope
LiveNOESIS never touches raw card data. Checkout runs inside Stripe Checkout or Stripe Elements (iframes). We store only the Stripe customer/subscription IDs and webhook event log, which keeps us inside the PCI DSS SAQ A scope.
server/billing/*, Stripe Checkout
AI provider terms - zero-training
LivePrimary inference is Anthropic Claude on the API (zero-training and 30-day retention by default). When Anthropic is unavailable we fail over to the Vercel AI Gateway, which also forwards to non-training providers. We do not use any consumer ChatGPT or public LLM surface.
lib/ai/anthropic-client.ts
CSRF + rate limiting + CSP
LiveAll state-changing routes require same-origin POSTs with JSON bodies. Destructive endpoints (purge, admin writes) have their own Upstash-backed rate limits. Every response carries a strict Content-Security-Policy, X-Frame-Options: DENY, Permissions-Policy, and Referrer-Policy header.
lib/security, next.config.ts
Audit trail
LiveSecurity-relevant events (login, password change, purge attempts, live-agent escalations, step-up failures) are written to a SecurityEvent table with IP, user-agent, and event metadata. Audit rows are retained even when customer data is purged.
prisma schema: SecurityEvent
Data Processing Addendum (DPA)
LiveA GDPR-/CCPA-compatible Data Processing Addendum is self-serve at /legal/dpa. One checkbox plus four fields counter-signs the active version, records an immutable signature row with the full sub-processor list and SCCs Module 2, and emails the signer a receipt. Required before first upload or integration connection.
/legal/dpa
AI Use Policy (EU AI Act / AB 2013 / CO SB 24-205)
LiveStandalone AI Use Policy at /legal/ai-use discloses the Anthropic Claude 4.7 model family (zero-retention, no training on customer data), what data reaches the model, enforced server-side guardrails (no figure invention, no legal/tax/fiduciary advice, injection defense, authority-cited tax commentary only), AI output labeling, and a per-workspace opt-out. Clickwrap-acknowledged at sign-up and on updates via the reacceptance gate.
/legal/ai-use
SOC 2 Type II
On roadmapSOC 2 Type II is on the public roadmap. Controls inventory and evidence collection are underway; we are not yet audit-ready. We are happy to share our controls narrative and gap assessment under NDA.
Roadmap - contact support@noesiscfo-io.us
Responding to security questionnaires
Send your SIG / CAIQ / custom questionnaire tosupport@noesiscfo-io.us. We usually turn items around within 3 business days. For urgent procurement timelines, note it in the subject and we will prioritize.
Report a vulnerability
If you believe you have found a security issue in NOESIS CFO, emailsupport@noesiscfo-io.us. We will acknowledge within 1 business day. Please do not share exploit details on public channels until we have had a chance to remediate.