Legal

Security

Security is foundational to ExecCortex. This page describes the technical controls, organizational practices, compliance commitments, and disclosure processes we use to protect your data and the integrity of the platform.

Last updated: May 2026|Effective: May 1, 2026

1. Our Security Philosophy

ExecCortex is an intelligence platform processing sensitive eCommerce data — orders, customer PII, financial information, ad spend, and AI-generated insights. We treat security not as a compliance checkbox but as a core product requirement. Every engineering decision considers confidentiality, integrity, and availability.

Our security program follows the NIST Cybersecurity Framework and is aligned with SOC 2 Type II criteria (audit in progress). We undergo annual third-party penetration testing and operate a continuous vulnerability management program.

2. Encryption

Data at rest:

  • All Customer Data is encrypted at rest using AES-256-GCM
  • Database volumes are encrypted using AWS EBS encryption with KMS-managed keys
  • Sensitive fields (OAuth tokens, API keys, webhook secrets) use envelope encryption with AWS KMS — each tenant's secrets are encrypted with a unique Customer Master Key (CMK)
  • S3 storage (backups, exports) uses server-side encryption with AWS S3 SSE-KMS

Data in transit:

  • All connections between clients and the ExecCortex platform use TLS 1.3
  • TLS 1.0 and 1.1 are disabled on all endpoints
  • We enforce HSTS (HTTP Strict Transport Security) with a 1-year max-age on all web properties
  • Internal service-to-service communication uses mutual TLS (mTLS) within our VPC

3. Access Control

Customer account access:

  • Password authentication requires a minimum of 12 characters
  • Two-factor authentication (TOTP and hardware key) is available on all paid plans
  • Role-based access control (RBAC): Owner, Admin, Analyst, and Read-only roles with granular permissions
  • SSO via SAML 2.0 is available on Enterprise plans
  • Session tokens expire after 24 hours of inactivity
  • All login events and permission changes are logged in the audit trail

Internal access by ExecCortex staff:

  • All engineering and operations staff use hardware security keys (FIDO2/WebAuthn) for privileged access
  • Production environment access is gated by a Privileged Access Management (PAM) system with session recording
  • No ExecCortex employee can access Customer Data without a documented, time-limited justification
  • All privileged access events are logged, reviewed weekly, and audited quarterly
  • Background checks are conducted on all employees with production access

4. Network and Infrastructure Security

  • All production infrastructure runs in AWS Virtual Private Clouds (VPCs) with private subnets for databases and internal services
  • Web Application Firewall (WAF) — AWS WAF + Cloudflare — protects all public endpoints from OWASP Top 10 threats
  • DDoS protection via Cloudflare with automatic traffic scrubbing at the edge
  • Network access control lists (NACLs) and security groups enforce least-privilege ingress/egress rules
  • All outbound traffic from production systems is routed through a monitored egress proxy
  • Intrusion Detection System (IDS) monitors network traffic for anomalous patterns
  • All infrastructure changes are made via Infrastructure-as-Code (Terraform); manual console changes are blocked in production

5. Application Security

  • All code undergoes peer review before merging to production
  • Static Application Security Testing (SAST) is run on every pull request using Semgrep
  • Software Composition Analysis (SCA) identifies vulnerable dependencies on every build
  • Dynamic Application Security Testing (DAST) is performed monthly on staging environments
  • SQL injection is prevented by parameterized queries via Prisma ORM — raw SQL is prohibited
  • All user input is validated and sanitized server-side before processing
  • Output encoding is applied to prevent XSS across all rendering contexts
  • Content Security Policy (CSP) headers are enforced on all web pages
  • Secrets are never committed to version control — scanning is enforced at the git hook and CI level
  • Dependencies are automatically updated weekly via Dependabot with required security reviews

6. Data Isolation and Multi-Tenancy

ExecCortex is a multi-tenant platform. Tenant isolation is enforced at every layer:

  • All database queries are scoped to the authenticated tenant's ID at the application layer
  • Tenant IDs are validated on every API request — no cross-tenant data access is architecturally possible
  • AI inference requests include only the requesting tenant's data — no cross-tenant context bleeding
  • Export and webhook payloads are validated to prevent data exfiltration to wrong endpoints
  • Penetration testing specifically targets tenant isolation each year

7. Business Continuity and Disaster Recovery

  • Database backups: Automated daily snapshots with 30-day retention. Point-in-time recovery available for the last 7 days
  • Multi-AZ deployment: All production services run across multiple AWS Availability Zones for high availability
  • Recovery Time Objective (RTO): < 4 hours for a full regional outage
  • Recovery Point Objective (RPO): < 1 hour (last backup restoration point)
  • Disaster recovery runbooks are tested quarterly
  • Status updates during incidents are published in real time at status.execcortex.com

8. Third-Party Security

Before onboarding any sub-processor or vendor with access to Customer Data, we conduct security due diligence including review of their SOC 2 reports or equivalent, penetration testing results, and data processing agreements.

Key vendor security postures:

  • AWS: SOC 2 Type II, ISO 27001, PCI DSS Level 1
  • Cloudflare: SOC 2 Type II, ISO 27001
  • Stripe: SOC 2 Type II, PCI DSS Level 1
  • OpenAI: SOC 2 Type II, zero-day data retention on API (no training on customer data)
  • Anthropic: SOC 2 Type II, API data is not used to train Claude models

9. Incident Response

ExecCortex maintains a documented Incident Response Plan aligned with NIST SP 800-61. Key elements:

  • Detection: Automated alerts from CloudWatch, Datadog, and Sentry trigger on-call pages 24/7
  • Triage: All security alerts are triaged within 15 minutes by the on-call engineer
  • Containment: Compromised systems are isolated within minutes using automated runbooks
  • Eradication: Root cause analysis and remediation within 24 hours for critical incidents
  • Recovery: Verified clean restoration from backup or rollback
  • Post-incident review: Published internally within 5 business days; customer-facing incident reports for significant events
  • Customer notification: Affected customers are notified within 72 hours of confirmed incidents involving their data

10. Compliance and Certifications

  • GDPR: Compliant — DPA, SCCs, EU data residency option available
  • SOC 2 Type II: Audit in progress — report expected Q4 2026. SOC 2 Type I report available on request under NDA
  • PCI DSS: ExecCortex does not store, process, or transmit card data directly. All payment processing is handled by Stripe (PCI DSS Level 1)
  • CCPA/CPRA: Compliant — privacy rights controls available in-platform
  • ISO 27001: In planning — certification target 2027
  • Penetration testing: Annual external pentest by an CREST-accredited firm; reports available under NDA for Enterprise customers

11. Responsible Disclosure Program

ExecCortex operates a responsible disclosure program. If you discover a security vulnerability in our platform, we ask that you:

  • Report it to security@execcortex.com as soon as possible
  • Include a description of the vulnerability, steps to reproduce, and potential impact
  • Give us reasonable time to investigate and remediate before any public disclosure
  • Not exploit the vulnerability beyond what is necessary to confirm it exists
  • Not access, modify, or exfiltrate data belonging to other customers

We commit to:

  • Acknowledge your report within 24 hours
  • Provide an initial triage response within 5 business days
  • Notify you when the vulnerability has been remediated
  • Recognize your contribution publicly (with your permission) in our security hall of fame
  • Consider bug bounty rewards for critical and high-severity findings (up to $1,000 for critical vulnerabilities)

Safe harbor: ExecCortex will not pursue legal action against researchers who follow these guidelines in good faith.

12. Employee Security

  • Security awareness training is required for all employees on hire and annually
  • Phishing simulation exercises are conducted quarterly
  • All employee devices are enrolled in MDM with full-disk encryption and remote-wipe capability
  • Off-boarding includes immediate access revocation across all systems within 1 hour
  • Background screening is conducted for all employees and contractors with access to production systems

13. Contact

Security concerns and vulnerability reports: security@execcortex.com

For urgent security incidents involving your account, contact us at security@execcortex.com with 'URGENT' in the subject line. We monitor this inbox 24/7.

For compliance documentation requests (SOC 2 report, DPA, penetration test summary): support@execcortex.com

Questions about this document?
We respond within one business day.
support@execcortex.com