Security & Compliance

Propel Security Practices

Safeguarding your AI code reviews with enterprise-grade security, comprehensive data protection, and industry-leading compliance standards.

Last updated: July 12, 2025

Enterprise-Grade Security

We understand that your code is your most valuable asset. Our security practices are designed to protect your intellectual property while enabling powerful AI-driven insights.

SOC 2 Compliant

We maintain SOC 2 Type II compliance with rigorous security controls and regular audits.

End-to-End Encryption

All data is encrypted in transit and at rest using industry-standard AES-256 encryption.

Zero Data Retention

We process your code for analysis but never store or retain it beyond the active session.

Hosting and Architecture

Our infrastructure is built with security and scalability in mind, offering multiple deployment options to meet your organization's needs.

Cloud-Based Services

Our primary deployment runs on AWS with multi-region redundancy and auto-scaling capabilities. We utilize AWS's enterprise-grade security features including VPC isolation, IAM controls, and CloudTrail logging.

  • Hosted on AWS with 99.9% uptime SLA
  • Multi-region deployment for redundancy
  • Auto-scaling based on demand
  • 24/7 monitoring and alerting

On-Premises Deployment

For organizations with strict data residency requirements, we offer self-hosted deployment options that keep all data within your infrastructure.

  • Complete data control and residency
  • Air-gapped deployment options
  • Custom security configurations
  • Dedicated support and maintenance

AI Model Security

Our AI models are deployed in secure, isolated environments with strict access controls and monitoring. We use a combination of proprietary and fine-tuned models optimized for code analysis.

  • Isolated model execution environments
  • No training on customer data
  • Regular model security assessments
  • Encrypted model storage and transfer

Data Handling and Privacy

We process your code to provide intelligent insights while maintaining the highest standards of privacy and data protection.

Code Processing

Your source code is processed in secure, isolated environments exclusively for the purpose of providing code review insights. We implement several key principles:

  • Temporary Processing: Code is analyzed in memory and never permanently stored
  • Session-Based: Data is purged immediately after analysis completion
  • Encrypted Transit: All code transmission uses TLS 1.3 encryption
  • No Model Training: Your code is never used to train or improve our AI models

Metadata and Analytics

We collect minimal metadata to provide service functionality and improve user experience:

  • Usage Statistics: Anonymized metrics for service optimization
  • Performance Data: Analysis timing and success rates
  • Error Logs: De-identified error information for debugging
  • User Preferences: Settings and configuration data

Data Rights and Control

You maintain full control over your data with comprehensive rights and options:

  • Data Portability: Export your data at any time
  • Right to Deletion: Request complete data removal
  • Access Controls: Granular permissions for team members
  • Audit Logs: Complete visibility into data access and processing

Security Controls and Monitoring

Our comprehensive security program includes multiple layers of protection, monitoring, and incident response capabilities.

Access Controls

  • • Multi-factor authentication (MFA) required
  • • Role-based access control (RBAC)
  • • Single Sign-On (SSO) integration
  • • Regular access reviews and audits
  • • Principle of least privilege

Infrastructure Security

  • • Network segmentation and firewalls
  • • Intrusion detection and prevention
  • • Regular security assessments
  • • Automated vulnerability scanning
  • • Incident response procedures

Monitoring and Logging

  • • 24/7 security monitoring
  • • Comprehensive audit logging
  • • Real-time threat detection
  • • Automated alerting systems
  • • Security information and event management (SIEM)

Incident Response

  • • Dedicated security response team
  • • Documented incident response procedures
  • • Regular incident response drills
  • • Customer notification protocols
  • • Post-incident analysis and improvement

Compliance and Certifications

We maintain industry-leading compliance standards and certifications to ensure your data is protected according to the highest security standards.

SOC 2 Compliant

SOC 2 Type II

Independently audited and certified for security, availability, processing integrity, confidentiality, and privacy.

GDPR Compliant

Full compliance with the General Data Protection Regulation for EU data protection and privacy rights.

ISO 27001

Information security management system certified to international standards for systematic security management.

CCPA Compliant

California Consumer Privacy Act compliance ensuring transparency and control over personal information.

Security Questions?

Our security team is here to answer any questions about our practices, compliance, or how we protect your data.

Propel LogoPROPEL

The AI Tech Lead that reviews, fixes, and guides your development team.

SOC 2 Compliant

© 2025 Propel Platform, Inc. All rights reserved.