Trust & Security

Trust Center

Security controls, incident commitments, and legal references for teams evaluating Laucked for production deployment.

Last updated

February 16, 2026

SOC 2 Program

In progress

Control mapping and evidence collection currently active.

Public Incident Process

Enabled

Customer-impacting incidents are communicated through the status page.

Data Subject Rights

Enabled

Export and account deletion workflows are available in-product.

Control Matrix

Core security domains and their implementation status.

Access & Identity

  • Role-based access control with team-scoped authorization.
  • Session hardening and protected API key pathways.
  • Audit trail for sensitive auth and admin actions.

Data Protection

  • Transport encryption with TLS for app and API traffic.
  • Encrypted storage for sensitive integration credentials.
  • Data retention and cleanup workflows enforced operationally.

Detection & Response

  • Incident triage by severity with escalation runbooks.
  • Status updates published until customer impact is resolved.
  • Post-incident remediation actions tracked in operations logs.

Architecture Snapshot

Public request path and critical services used for platform operation.

ClientVercel AppNeon DBRedisStripe

Infrastructure & Hosting

Built on trusted, enterprise-grade cloud providers.

Vercel

Edge-first hosting & serverless functions

Neon

Serverless PostgreSQL with branching

Redis (Upstash)

Managed cache, queues & rate limiting

Frequently Asked Questions

Common questions about our security practices.

Legal & Operational References

Laucked AI-SPM | AI Security Posture Management