Skip to main content
PromptGuard is built with enterprise security requirements in mind. This page outlines our security practices, compliance status, and data handling policies.

Security Certifications

CertificationStatusDetails
SOC 2 Type IIIn ProgressExpected Q2 2026
GDPRCompliantEU data processing agreement available
CCPACompliantCalifornia consumer privacy rights
ISO 27001PlannedOn roadmap for 2026
HIPAAAvailableEnterprise tier with BAA
For enterprise customers requiring specific compliance certifications, contact sales@promptguard.co to discuss your requirements.

Data Handling

What Data We Process

Data TypeProcessingRetention
Prompts & MessagesScanned for threats in memoryNot stored (pass-through)
API KeysEncrypted at rest (AES-256)Until deleted
Usage MetricsAggregated counts90 days
Security EventsThreat details logged30 days (configurable)
Audit LogsUser actions90 days

Data Flow

Pass-Through Architecture

PromptGuard operates as a pass-through proxy:
  • Prompts and responses are scanned in memory
  • Content is not stored after processing
  • Only metadata (timestamps, threat types, confidence scores) is logged
  • Your data never touches disk in unencrypted form
Security event logs may contain sanitized snippets of blocked content for debugging purposes. These are automatically purged after the retention period. Enterprise customers can disable content logging entirely.

Infrastructure Security

Cloud Infrastructure

ComponentProviderSecurity
ComputeGoogle Cloud RunServerless, auto-scaling
DatabaseSupabase (PostgreSQL)Encrypted at rest, TLS in transit
SecretsGoogle Secret ManagerIAM-controlled access
CDN/DDoSGoogle Cloud ArmorRate limiting, WAF
DNSCloudflareDDoS protection

Encryption

LayerStandard
In TransitTLS 1.3
At RestAES-256
API KeysArgon2id hashing
SecretsGoogle KMS

Network Security

  • All endpoints require HTTPS
  • Cloud Armor rate limiting (100 req/min per IP)
  • No public SSH access to infrastructure
  • VPC-based isolation between services
  • Private database connections (no public IP)

Access Control

Authentication Methods

MethodUse Case
API KeyServer-to-server, SDK integrations
Session (JWT)Dashboard access
OAuthGitHub/Google SSO
SAML/OIDCEnterprise SSO (Enterprise tier)

API Key Security

  • Keys are hashed with Argon2id before storage
  • Only the prefix (pg_xxxx...) is stored in plain text
  • Full key shown only once at creation
  • Keys can be rotated without downtime
  • Per-key permissions (read, write, proxy, manage)

Role-Based Access (Enterprise)

RolePermissions
OwnerFull access, billing, delete organization
AdminManage users, projects, settings
MemberView projects, create API keys
ViewerRead-only dashboard access

Audit Logging

What’s Logged

EventDetails Captured
AuthenticationLogin, logout, failed attempts
API Key ManagementCreate, rotate, delete
Project ChangesSettings, policies, presets
Security EventsBlocked requests, threat types
User ManagementInvites, role changes

Accessing Audit Logs

  1. Go to Dashboard → Settings → Audit Logs
  2. Filter by date range, event type, or user
  3. Export as CSV or JSON

Log Export (Enterprise)

Enterprise customers can configure:
  • SIEM Integration: Stream logs to Splunk, Datadog, etc.
  • S3 Export: Daily log exports to your bucket
  • Webhook: Real-time log forwarding

Incident Response

Security Incident Process

  1. Detection: Automated monitoring + manual review
  2. Containment: Isolate affected systems
  3. Investigation: Root cause analysis
  4. Notification: Affected customers notified within 72 hours
  5. Remediation: Fix deployed, post-mortem published

Reporting Security Issues

Found a vulnerability? Contact us:

Data Residency

Current Regions

RegionData Center
USGoogle Cloud us-central1 (Iowa)

Planned Regions

RegionStatus
EU (Frankfurt)Q3 2026
APAC (Singapore)Q4 2026
Enterprise customers requiring specific data residency can request dedicated deployment in their preferred region.

Vendor Security

Subprocessors

VendorPurposeData Processed
Google CloudInfrastructureAll data
SupabaseDatabaseMetadata, logs
StripeBillingPayment info
ResendEmailEmail addresses

LLM Providers

PromptGuard forwards requests to your chosen LLM provider. We do not store data sent to:
  • OpenAI
  • Anthropic
  • Google AI
  • Cohere
  • AWS Bedrock
  • Azure OpenAI
Your data handling agreement is with each LLM provider directly.

Enterprise Security Features

Available on the Enterprise tier:
FeatureDescription
Self-Hosted DeploymentRun PromptGuard in your own infrastructure
Air-Gapped ModeZero external network calls
SSO (SAML/OIDC)Integrate with your IdP
IP AllowlistingRestrict API access by IP
Custom Data RetentionConfigure log retention periods
Dedicated SupportSLA-backed support with named contact
Custom BAAHIPAA Business Associate Agreement

Security Questionnaire

Need to complete a vendor security assessment? We provide:
  • CAIQ (Consensus Assessment Initiative Questionnaire)
  • SIG Lite (Standardized Information Gathering)
  • Custom Questionnaires (for Enterprise customers)
Contact security@promptguard.co for these documents.

Responsible Disclosure

We appreciate security researchers who help keep PromptGuard secure:
  1. Report the issue to security@promptguard.co
  2. Do not publicly disclose until we’ve addressed it
  3. Provide steps to reproduce
  4. Allow reasonable time for remediation (90 days)

Next Steps