← back to home

Security

How War Room handles your data.

A short, plain-language summary. For a long-form security questionnaire, request the document at security@twinflamegroup.com.

Encryption — at rest

AES-256 across all primary data stores. Database encryption keys rotated quarterly via the platform's KMS. Backups are encrypted with the same standard.

Encryption — in transit

TLS 1.3 for every public endpoint. HSTS preload. Internal service-to-service traffic is mTLS.

Data isolation

Each customer vertical runs in a logically isolated tenant. Enterprise customers can opt into dedicated infrastructure on request.

Authentication

Email + magic link or SSO (SAML / OIDC) for all dashboards. MCP/voice access is scoped per-user, per-vertical, with revocable tokens.

Access control

Role-based access at the user level. Audit log of every read and write. The audit log is itself append-only and externally archived.

AI / LLM data handling

Model calls go through Anthropic's API with zero-retention enterprise terms. No customer data is used to train any model. Prompts are logged for debugging and retained for 30 days, then purged.

SOC 2 Type II

In progress. Targeting completion within 90 days of public launch. We will publish the report under NDA to qualified enterprise prospects.

BAA availability

Available for enterprise customers in healthcare verticals on request.

Subprocessors

Anthropic (LLM inference) · Stripe (payments) · Supabase (primary database) · Resend / Gmail (email send) · Netlify (edge hosting). Full list updated on this page when subprocessors change.

Vulnerability disclosure

Responsible disclosure welcomed at security@twinflamegroup.com. We acknowledge within 48 hours and patch within agreed timelines.

Last updated: April 2026. We will note future updates inline on this page.