Security Posture, Trust, and Privacy
This page summarizes our current security posture from internal documentation and operating controls.
Snapshot date: January 27, 2026
SOC 2 Status
SOC 2 readiness work is in progress. We are not presenting this as a current SOC 2 Type I or Type II attestation.
Identity and Access Controls
WorkOS AuthKit support, org-level RBAC, and enterprise admin/owner MFA policy are part of the access control baseline.
Audit Trail and Governance Evidence
Audit events are written to DynamoDB with TTL controls and can be forwarded to WorkOS audit logs for enterprise visibility.
Session and Abuse Protection
JWT lifetimes and login/reset/API key rate limits are runtime-configurable with documented defaults.
Network and Origin Controls
CORS allowlists and Socket.IO allowed-origins are configurable for production deployments.
Data Retention and Deletion Policy
Published policy defines default retention windows and deletion request handling timelines.
Incident Response and Risk Management
Documented incident response, vendor management, and risk assessment policies govern security operations.
Security Hardening and Testing
An internal security/pentest pass and runtime hardening updates are documented, including timeout, rate-limit, and auth posture work.
Outreach Safety Guardrails
Business-hour controls, pacing constraints, connection-gate checks, and human review controls are built into ABM execution flows.
Security Documentation Available
- Access Control Policy
- Data Retention and Deletion Policy
- Incident Response Plan
- Vendor Management Policy
- Risk Assessment
- Audit Trail Setup
- SOC 2 Readiness Audit
- Security / Pentest Pass Notes
DPA, SLA, and subprocessor details are available upon request.
Support: support@laserreach.com · Security: security@laserreach.com
