Enterprise-Grade Security & Compliance
SyncRivo is SOC 2 Type II certified and HIPAA-ready. Messages route in real time and are never stored on SyncRivo infrastructure. Every integration uses OAuth 2.0 with per-tenant isolation.
Certifications & Compliance
Independent third-party audits and compliance frameworks that verify our security controls.
SOC 2 Type II
CertifiedAudit period: Jan 1 – Dec 31, 2025
AICPA Trust Service Criteria: Security, Availability, Confidentiality
Full report available to customers and prospects under NDA.
SOC 2 DetailsHIPAA Ready
BAA AvailableBusiness Associate Agreement on Enterprise plans
Zero data-at-rest, encrypted transit, audit logging, and per-tenant isolation satisfy HIPAA technical safeguards.
Contact sales to sign a BAA before processing PHI.
HIPAA DetailsGDPR
CompliantData Processing Agreement available
SyncRivo acts as a data processor under GDPR. EU data stays within EU regions on request. Full DPA available.
EU customers can request a signed DPA.
GDPR DetailsISO 27001
AlignedControls mapped to ISO/IEC 27001:2022
SyncRivo's ISMS is aligned to ISO 27001 controls covering asset management, access control, cryptography, and incident response.
Formal certification in progress.
ISO 27001 DetailsSecurity Controls
The technical and organizational controls SyncRivo uses to protect your data and integrations.
Encryption everywhere
- TLS 1.2+ for all data in transit
- AES-256 encryption for data at rest
- Message content never persisted on SyncRivo infrastructure (zero data-at-rest)
Authentication & authorization
- OAuth 2.0 per integration — scoped, revocable tokens only
- JWT lifecycle management with short expiry and rotation
- RBAC — role-based access control for every organization
- MFA enforced on all SyncRivo employee accounts
Isolation & multi-tenancy
- Per-tenant data isolation — no cross-organization data access
- Separate encryption keys per tenant
- Immutable audit logs for all administrative and routing events
Infrastructure
- Hosted on Google Cloud Run (GCP) — SOC 2 Type II certified infrastructure
- MongoDB Atlas with encryption at rest and in transit
- Automated vulnerability scanning on every deployment
- Dependency pinning and SCA (Software Composition Analysis) in CI
Monitoring & incident response
- 24/7 infrastructure monitoring with automated alerting
- Structured audit logging for all API access and authentication events
- Documented incident response playbook (reviewed annually)
- RTO < 4 hours for critical incidents
Vulnerability management
- Responsible disclosure program — security@syncrivo.ai
- CVE triage within 24 hours, critical patches within 48 hours
- Annual third-party penetration testing
- Coordinated disclosure with 90-day embargo for researchers
Zero Message Storage Architecture
SyncRivo is a message router, not a message store. When a message arrives via webhook, SyncRivo transforms it and delivers it to the target platform in real time — the message content is never written to disk on SyncRivo infrastructure.
This architecture satisfies data residency requirements, simplifies GDPR compliance (no content to delete on request), and means a SyncRivo security incident cannot result in a breach of your message content.
What SyncRivo does store: channel mapping configurations, OAuth tokens (encrypted), routing rules, and audit log metadata (no message content). All stored data is encrypted at rest with AES-256.
How Your Messages Flow Through SyncRivo
Every message follows the same in-memory routing path. No content is persisted at any step.
Message arrives via webhook
The source platform (e.g., Slack) sends a signed webhook event to SyncRivo's ingestion endpoint over TLS 1.3. SyncRivo verifies the platform signature before processing — unsigned or malformed events are rejected immediately.
Identity resolved, no content stored
SyncRivo looks up the routing rule for the source channel and resolves the destination. The message payload is held in memory only — it is never written to disk or logged. Routing metadata (channel IDs, timestamps) is logged without message content.
Message transformed in-memory
SyncRivo translates platform-specific formatting — @mentions, thread context, file references — into the target platform's schema. This transformation occurs entirely in memory within the request lifecycle.
Delivery to target platform
The transformed message is delivered to the destination platform (e.g., Microsoft Teams) via the platform's official API over TLS. SyncRivo uses short-lived, scoped OAuth 2.0 tokens stored in an encrypted credential vault — not hardcoded secrets.
Audit event recorded (no content)
A delivery confirmation event is written to the immutable audit log: timestamp, source channel hash, destination channel hash, delivery status, and latency. Message content is never included in audit records.
Shared Responsibility Model
Security is a partnership. Here's how responsibilities are divided between SyncRivo and the customer.
SyncRivo is responsible for
- SOC 2 Type II certification and annual third-party audits
- Physical and logical security of cloud infrastructure (GCP)
- Encryption of OAuth tokens and routing configuration at rest
- Availability and uptime per SLA (99.9–99.99%)
- Patching and vulnerability management of the SyncRivo platform
- Incident detection, response, and notification to affected customers
Customer is responsible for
- OAuth scope selection and token revocation when users leave
- Access control to the SyncRivo dashboard (who can create/delete connections)
- Compliance obligations specific to your industry (e.g., HIPAA BAA must be signed)
- Content appropriateness in channels being bridged
- Review of sub-processor list and DPA terms before onboarding
- Incident reporting obligations under your applicable regulations
Responsible Disclosure
If you discover a security vulnerability in SyncRivo, please email security@syncrivo.ai. We triage all reports within 24 hours and coordinate disclosure with a 90-day embargo window. We do not take legal action against good-faith security researchers.
Read Vulnerability Disclosure PolicySecurity FAQs
Common questions from enterprise security and procurement teams.
Security review for your procurement team?
We provide the SOC 2 Type II report, penetration test summary, completed security questionnaires (VSA, SIG, CAIQ), and custom data-flow diagrams under NDA.
Request Security PackageLast updated: March 26, 2026 · SOC 2 audit period: Jan 1 – Dec 31, 2025