Security & Trust

Built by security operators.
Defended like one.

After Action holds itself to the same standards we help our clients meet. This page documents every control we enforce, the frameworks we align to, and how to reach us if you find something we missed.

Platform controls

Every control listed is enforced in production today.

01

Encryption in transit & at rest

TLS 1.3 on every connection with HSTS preload. AES-256 at rest on all Postgres tables and Supabase Storage buckets. No plaintext secrets anywhere in the stack.

02

Row-level security on every table

All 42 database tables enforce row-level security policies. Users can only read data from organizations they belong to. The service-role key is never used in client-side code.

03

Hashed API keys

Carrier API keys are SHA-256 hashed before storage. We never see or store the plaintext. Rotation is self-service and takes effect immediately.

04

Authentication via Supabase

Email + password with bcrypt hashing, magic-link option, session cookies with HttpOnly + Secure + SameSite=Lax. Sessions auto-refresh via Next.js middleware; no exposed tokens.

05

Data residency you control

Pick your Supabase region at org creation — US, EU, APAC. We do not move data across regions. Backups are encrypted and retained for 30 days.

06

Immutable audit log

Every sensitive mutation (exercise edits, deliverable exports, certificate issuance) is written to an append-only audit_log table with actor, timestamp, and before/after snapshots.

07

Infrastructure hardening

CSP, X-Frame-Options: DENY, X-Content-Type-Options: nosniff, strict CORS, Permissions-Policy disabling camera/mic/geolocation. Deployed on Vercel with automatic TLS.

08

Vulnerability management

Dependency scanning on every build, mandatory type-check + test gate before deploy, and Sentry error tracking in production. Reports acknowledged within 24 hours.

Compliance posture

What we've achieved, what's on the roadmap.

FrameworkPostureState
SOC 2 Type IIRoadmap Q3 2026roadmap
NIST 800-61 rev 3Alignedlive
NIST CSF 2.0Mapping engine built-inmapped
ISO 27001:2022Mapping engine built-inmapped
HIPAABAA on Enterprise tierlive
PCI-DSS 4.0Mapping engine built-inmapped
CIS Controls v8Mapping engine built-inmapped
CMMC Level 2Mapping engine built-inmapped

Responsible disclosure

Found something? Tell us.

Email security@afteraction.dev with reproduction steps. We acknowledge every report within 24 hours and will keep you updated until it's resolved. We do not pursue legal action against good-faith researchers who follow this policy.

Security reports

security@afteraction.dev

Privacy requests

privacy@afteraction.dev