Priventia is built with security-by-design and privacy-by-design principles at every layer. The same standards we help organisations achieve are the standards we hold ourselves to.
Priventia uses a limited number of sub-processors to deliver platform functionality. Each is selected for its security posture and, where available, EU hosting region. We will notify customers of any changes to this list.
| Sub-processor | Purpose | Data location | Certifications |
|---|---|---|---|
| Supabase | Database, authentication, row-level security | AWS eu-west-1 (Ireland) * | SOC 2 Type II |
| Vercel | Application hosting, edge network, serverless functions | Global CDN; compute configurable to EU | SOC 2 Type II |
| Sentry | Error monitoring and application performance | EU (Frankfurt) | SOC 2 Type II |
| Google Workspace | Business email, customer communication | EU (Netherlands) | SOC 2 Type II ISO 27001 |
| Google Fonts | Web font delivery (Playfair Display, Inter) | Global CDN | -- |
* Confirm your Supabase project region in your dashboard under Project Settings. EU hosting (Ireland or Frankfurt) is available and recommended for EU-based organisations.
Priventia implements layered encryption and strict secrets management aligned with ISO 27001 A.8.24 and SOC 2 CC6.7.
Priventia is designed with ISO 27001:2022 and SOC 2 Type I trust criteria as architectural requirements, not afterthoughts.
| Control Area | ISO 27001 | SOC 2 | Implementation |
|---|---|---|---|
| Authentication | A.8.5 | CC6.1 | Supabase Auth + TOTP MFA (AAL2 enforced) |
| Session Security | A.8.5 | CC6.1 | httpOnly cookies via @supabase/ssr |
| Access Control | A.9.4 | CC6.1 | RBAC with role hierarchy, RLS |
| Tenant Isolation | A.8.22 | CC6.3 | PostgreSQL row-level security policies |
| Audit Logging | A.8.15 | CC7.2 | DB triggers + API-level logging (21 tables) |
| Log Retention | A.8.15 | CC7.2 | 365-day retention, critical logs exempt from purge |
| Rate Limiting | A.8.20 | CC6.6 | Per-IP sliding window by route category |
| File Security | A.8.10 | CC6.7 | MIME validation, size limits, magic byte checks |
| Transport Security | A.8.24 | CC6.7 | TLS 1.2+ with HSTS preload |
| Security Headers | A.8.20 | CC6.6 | OWASP recommended headers on all responses |
| Data Deletion | A.8.10 | CC6.5 | Account deletion, data export, GDPR Article 17 |
| Privileged Access | A.8.2 | CC6.1 | Impersonation tracking with full audit trail |
We are happy to discuss our security architecture, data handling practices, or any specific requirements your organisation may have.