Security at Archival

Archival processes sensitive data about how teams use AI. We take that responsibility seriously. This page outlines our approach to security, data handling, and infrastructure.


Our approach

Security is built into Archival from the architecture level, not bolted on after the fact. We follow least-privilege access principles, encrypt data at every layer, and isolate customer environments by design.

Data encryption

All data is encrypted in transit using TLS 1.2 or higher and at rest using AES-256 encryption. Encryption keys are managed through industry-standard key management services.

Tenant isolation

Customer data is logically isolated. There is no cross-tenant access by design. Each customer's data is segmented at the infrastructure level.

Access control

Internal access follows least-privilege principles. All access to production systems is logged and auditable. Role-based permissions ensure team members only access what they need.

Compliance

We are an early-stage company and do not yet hold SOC 2 or ISO 27001 certifications. We are actively working toward these and are happy to share our current security practices, architecture documentation, and answer any questions directly.

Questions?

If you have questions about our security practices or would like a detailed review, please reach out. We believe transparency is the best foundation for trust.