Compliance & Certifications
The certifications that matter to your procurement team.
SOC 2 Type I
Independently audited security controls across availability, confidentiality, and privacy trust service criteria.
AES-256 + TLS 1.2+
All data encrypted at rest with AES-256 and in transit with TLS 1.2 or higher. Per-tenant key management.
Single-Tenant AWS
Dedicated infrastructure per customer. No shared compute, no shared storage, no resource co-location.
Cyber Insurance
Cyber liability coverage underwritten by State National. Available for review under NDA.
Secure SDLC
Security requirements built into every development phase. Code review, dependency scanning, and pre-deployment security gates.
Infrastructure
Built for the security requirements of financial services.
Single-tenant deployment, AES-256 encryption, and immutable audit logging. By default, not as an add-on.
Single-Tenant Infrastructure
Every customer runs on dedicated infrastructure. Your data is never co-located with another organization's. No shared compute, no shared storage.
End-to-End Encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.2+). Encryption keys are managed per-tenant and never shared across accounts.
Role-Based Access Controls
Granular permissions tied to individual roles and responsibilities. Admins control who can view, edit, and act on sensitive data at the field level.
Full Audit Trails
Every action is logged with timestamps, user context, and outcome: AI decisions, human reviews, data access. Immutable and exportable.
Vulnerability Management
Regular dependency scanning, CVE monitoring, and patch SLAs. Critical vulnerabilities patched within 24 hours.
Incident Response
Documented IR plan with defined escalation paths and customer notification SLAs.
Data Residency
Customer data stored in US-based AWS regions. No cross-border data transfer without explicit consent.
Employee Security
Background checks, security training, and signed NDAs for all personnel with data access.
Common Questions
Security & compliance FAQ.
Direct answers to what compliance officers, CISOs, and legal teams ask before deploying AI in a regulated environment.
Security Inquiries
Still have questions?
Our security team responds within one business day. For pen test reports, DPA requests, or compliance documentation, include your organization name and use case.
devs@unlimited.financeFor Procurement Teams
Ready to complete your security review?
Our security team typically completes vendor questionnaires and provides required documentation within 5 business days.
What's included