Security at Riposte
Riposte is engineered for regulated teams that expect uncompromising security. We operate as infrastructure software, never a downstream sub-processor—your data stays within your tenancy and only touches the mail servers you configure. HIPAA-ready controls, signed audit trails, and optional BAAs are available for healthcare, financial, and legal platforms.
Your tenancy, your data
Riposte ships as infrastructure software—deployed in your environment, never operating as a downstream sub-processor.
Enterprise-grade data protection
Single-tenant deployment only exchanges traffic with the mail servers you approve, with encrypted transport, storage, and rigorous access governance.
Controls aligned to SOC 2
Policies, procedures, and evidence mapped to SOC 2 Type II criteria for rapid diligence without introducing new processors.
Compliance programs backed by evidence
Riposte ships with controls and documentation mapped to the regulations our customers face—from HIPAA and GLBA to GDPR and regional residency mandates.
HIPAA-ready deployments
Encrypt PHI with customer-managed keys, sign a BAA, and inherit audit trails that align to HIPAA Security Rule safeguards.
- BAA templates and control mappings reviewed by healthcare counsel.
- Optional TLS inspection disabled by default so ePHI never leaves your network.
- Immutable admin logs exported to your SIEM for HIPAA and HITRUST retention requirements.
Financial services controls
Support GLBA, FINRA, and SEC 17a-4 programs with WORM storage options and delegated supervision workflows.
- Evidence packages cover SOC 2 Type II, vulnerability management, and incident response.
- Configurable retention windows, legal hold APIs, and journaling connectors for broker-dealers.
- IP allow-listing and hardware-backed keys ensure remote mail stores respect your perimeter.
Global data residency
Deploy Riposte in-region—EU, Canada, or APAC—to satisfy sovereignty programs without multi-tenant spillover.
- No shared storage: every deployment writes only to your Postgres, Redis, and object storage.
- Granular role-based access ensures regional support teams only touch their tenancy.
- Data flow diagrams and DPIA templates accelerate GDPR and local regulatory reviews.
Data control features built into the platform
Keep regulated content in your perimeter while giving legal, security, and operations teams the guardrails they require.
Auditability by default
- Every admin action, CLI command, and configuration change emits an append-only log with actor, scope, and before/after values.
- Webhook deliveries include signed request IDs so you can trace a message from provider to downstream system.
- Customer support views redact message content unless users hold explicit scoped roles.
Encryption & key stewardship
- Support for customer-managed KMS (AWS KMS, GCP KMS, Azure Key Vault) with per-tenant key rotation.
- Secrets never leave your vault—Riposte references them via short-lived tokens at runtime.
- TLS 1.3 everywhere with optional mTLS for provider callbacks and webhook endpoints.
Data lifecycle controls
- Configurable retention policies down to the label and folder level with automatic purge jobs.
- On-demand redaction and export workflows help satisfy right-to-erasure requests without downtime.
- Isolated staging environments mirror production controls for validation before audits.
Built-in safeguards across the stack
Every Riposte deployment inherits layered controls so your team can meet regulatory, contractual, and customer commitments without handing data to an additional processor.
Identity & access management
Centralized SSO, enforced MFA, and automated onboarding/offboarding keep privileged systems locked down with no shared operator accounts.
- IdP-enforced MFA for all workforce access to production and admin tools.
- Role-based access provisioning with quarterly reviews and break-glass tracking.
- Service account secrets rotated through managed vaults and IaC—no Riposte-operated credentials in your environment.
Hardened infrastructure
Infrastructure-as-code baselines, automated patching, and continuous vulnerability scanning maintain a resilient perimeter inside your network.
- Golden AMIs and container images scanned before release with signed artifacts you control.
- Automated configuration drift detection across cloud resources.
- Nightly backups with quarterly restore testing for critical services.
Secure development lifecycle
Peer-reviewed code, dependency monitoring, and staged deployments reduce the chance of regressions reaching customers.
- Pull-request reviews required with automated testing gates in CI/CD.
- Static analysis and dependency scanning on each merge to main.
- Production changes traceable to tickets with documented approvals.
Operational excellence you can audit
Our control owners run recurring ceremonies and log evidence so you can verify safeguards are operating inside your tenancy all year long.
Monitoring & response
- Centralized log aggregation with alert routing to the on-call rotation—telemetry stays inside your tenancy.
- Documented incident response plan plus semi-annual tabletop exercises.
- Customer communications templated for rapid status updates during incidents.
Resilience & continuity
- Business impact analysis guides recovery objectives across hosted and self-managed services without transferring custody of customer content.
- Disaster recovery plan with failover runbooks reviewed and tested every six months.
- Backup and retention standards align to customer contractual commitments with encryption keys under your control.
People & third parties
- Background checks, security awareness training, and acceptable use acknowledgements for every employee.
- Vendor risk assessments ensure no analytics, marketing, or additional processors touch customer message data.
- Change-advisory board reviews for high-risk releases and production access requests.
Independent assurance & governance
Penetration testing, continuity exercises, and executive governance validate that Riposte delivers the platform without introducing extra data processors.
Quarterly risk & control reviews
Security steering committee documents quarterly reviews of the risk register, remediation milestones, and SOC 2 control alignment with updates reported to leadership.
Semi-annual
Third-party assessors execute infrastructure, application, and social engineering tests focused on the mail flow boundary, with tracked remediation and executive review.
Quarterly exercises
Tabletop scenarios, backup restores, and crisis communications rehearsals validate continuity without replicating customer data outside your tenancy.
Security documentation you can review
Our SOC 2 package includes the following policies, procedures, and templates. We share them under NDA so your security and legal teams can move quickly.
Governance & oversight
Exec-sponsored policies that define our security program, risk management cadence, and accountability.
- Information Security Policy Shared under mutual NDA
Sets the overarching control framework and executive governance model.
- Compliance Management Policy Shared under mutual NDA
Outlines compliance ownership, control monitoring, and reporting obligations.
- Risk Management Policy Summary available on this page
Describes quarterly risk reviews, scoring methodology, and mitigation tracking.
- Roles & Responsibilities Matrix Shared under mutual NDA
Maps leadership, engineering, and operations accountability across SOC 2 criteria.
Access & application security
Identity, change, and development controls that protect production environments and code.
- Access Control Policy Summary available on this page
Defines least privilege, provisioning workflows, and quarterly reviews.
- Secure SDLC Policy Shared under mutual NDA
Covers coding standards, peer review, automated testing, and release management.
- Change Management Policy Shared under mutual NDA
Specifies approval, testing, and emergency change guardrails for infrastructure and application updates.
- Access Review Procedure Template shared on request
Template and cadence for quarterly privileged access attestation.
Operations & detection
Monitoring, vulnerability management, and incident response runbooks that keep teams prepared.
- Security Monitoring & Logging Standard Summary available on this page
Specifies log sources, retention targets, and alert triage expectations.
- Vulnerability Management Policy Shared under mutual NDA
Establishes scanning cadence, severity SLAs, and remediation workflows.
- Incident Response Plan Table of contents shared on request
Roles, severity matrix, and tabletop schedule for coordinated incident handling.
- Incident Report Template Template shared on request
Structured evidence collection for internal post-incident reviews and customer updates.
Continuity, people, & vendors
Safeguards for resilience, workforce readiness, and the partner ecosystem supporting Riposte.
- Business Continuity & Disaster Recovery Plan Shared under mutual NDA
Defines impact tiers, RTO/RPO targets, and failover playbooks.
- Backup & Recovery Policy Summary available on this page
Documented backup scope, encryption requirements, and restoration testing cadence.
- Vendor Management Policy Shared under mutual NDA
Due diligence lifecycle, contract requirements, and ongoing monitoring expectations.
- Security Awareness & Training Policy Summary available on this page
Annual training requirements, phishing simulations, and disciplinary actions.
- Background Check Policy Shared under mutual NDA
Pre-employment screening standards for employees and contractors.
- Business Impact Analysis Worksheet Template shared on request
Template used to document process criticality and recovery requirements.
How to get in touch with our security team
Whether you need to complete a vendor assessment, coordinate a pen test, or disclose a bug, our security inbox is monitored by the same team that runs our compliance program.
Request the Riposte security briefing
Email [email protected] for our control summary, data flow diagrams, and diligence responses documenting the absence of downstream processors.
Email [email protected]Report a vulnerability
We operate a coordinated disclosure program. Send suspected issues—especially around mail gateway boundaries—to [email protected] with supporting details for rapid triage.
Submit a reportSchedule a security review
Book time with our compliance lead for an architecture walkthrough focused on tenancy isolation and mail provider integrations.
Book a reviewRun Riposte in your cloud.
Deploy the platform in Kubernetes, ECS, or bare metal and keep every message and calendar event inside your security boundary.