Skip to content

Trust & Security

Architected So Your Security Team Can Sign Off

Separate database per customer. Append-only audit logs on every change. Role-based access on every query. Continuous scanning at every layer. The data your AI agents read is the data your security team will sign off on.

How We Build

Eight Pillars of the RolloutIQ Trust Model

Security and privacy are architectural choices we made at the foundation, not policies we hope you trust. Here is what that looks like in practice.

Database-Level Tenant Isolation

Each customer runs on a separate database. There are no shared tables, no shared rows, and no shared indices. Cross-tenant data leaks are structurally impossible, not a policy you have to trust.

  • Separate database per customer
  • Right-to-erasure is a clean removal, not a row-by-row purge
  • Tenant boundaries enforced and tested in every release

Append-Only Audit Logging

Every create, update, and delete on key records is captured in an append-only audit log. Each entry carries timestamp, IP address, user agent, and the full change delta. Sensitive fields are excluded.

  • Centralized audit trail per customer
  • Queryable by record, event, user, and date range
  • Tamper-resistant by design

Role-Based Access on Every Query

The same access controls that guard the UI also guard the API and the MCP server. Permissions follow assignment scope: a Construction PM assigned to one project sees only that project, on every surface.

  • Role-based + entity-scoped permissions
  • Vendor and consultant access inherits from employer-company assignments
  • Permission changes take effect on the next request

Continuous Security Scanning

Every code change runs through automated security checks. Container images and infrastructure are scanned continuously. Production endpoints are scanned regularly. High-severity findings block release.

  • Static analysis on every code change
  • Dependency and container scanning on every build
  • Dynamic scanning against live endpoints
  • Dependency updates held for supply-chain review

Encrypted Secrets, Always

Integration credentials and OAuth client secrets are encrypted at rest and masked in API responses. Customer-controlled rotation, no shared keys.

  • Customer integration secrets encrypted at rest
  • Masked everywhere outside the integration adapter
  • No secrets in source control, enforced by tooling

Identity & Access Management

Customer-controlled tokens secure both the API and the MCP server, issued from the tenant admin and revocable at any time. Roles are tunable per customer; admins control which capabilities flow to each role.

  • Tokens issued and revoked from the tenant admin
  • Per-customer capability matrix for every role
  • Vendor invites with company-scoped permission inheritance

Production-Grade Observability

RolloutIQ runs a multi-layer observability stack so the support team can diagnose issues without ever touching customer data. Errors, performance, queues, and slow queries all have first-class dashboards.

  • Real-time error tracking and session replay
  • Application performance monitoring and tracing
  • Background job and queue health dashboards
  • External uptime, certificate, and link monitoring

Operational Transparency

Customers can pull their full audit trail via API, manage their own role and capability matrix, and review every login and integration event. You see what we see.

  • Audit history queryable by record, event, user, and date
  • Per-customer capability matrix editable by admins
  • Authentication and integration events captured

Compliance Posture

Built for Enterprise Procurement Reviews

We work with security and compliance teams during procurement. Database-level isolation, queryable audit logs, and a documented security scanning regime cover the substantive questions on most enterprise reviews. For specifics about our roadmap toward formal certifications or to request a security review packet, contact our team.

Ready to Talk About Your Trust Requirements?

Our team works through enterprise procurement and security reviews with you. Book a demo or request our security review packet.