Skip to content

Security at ResolvCmd

We are transparent about our current security posture, what we are working on, and what is on the roadmap. No overclaiming.

Current controls

Tenant isolation

Every customer's data is walled off by design. Row-level security in PostgreSQL. Tenant-filtered Qdrant queries. No cross-tenant data access is possible.

Encrypted credentials at rest

Fernet encryption on all stored integration tokens (Zendesk OAuth, ConnectWise API keys, Confluence tokens). Keys managed via standard infrastructure secret management.

Full disk encryption

LUKS on all infrastructure volumes. Host-level encryption at rest.

OAuth and least-privilege scopes

Where the upstream platform supports it (Zendesk, Google Drive, future Microsoft Graph), we use OAuth with scoped permissions. We request only the access we need to deliver resolutions.

Role-based access control

Admin, Technician, and Read-only roles enforced at the API layer. Granular permissions for Studio actions, billing, and configuration.

Audit logging

Immutable log of administrative actions, authentication events, and data lifecycle events. One-year retention. Available for export.

Source citation transparency

Every resolution shows exactly which documents and chunks were used to generate it. No opaque generation. Confidence levels (HIGH, MEDIUM, LOW) are exposed on every response.

Data lifecycle

30-day soft delete on customer-initiated removal, then a hard delete cascade across PostgreSQL, Qdrant, and the staging filesystem. We can also delete on demand.

In progress

CASA Tier 2 assessment

We are currently undergoing a CASA Tier 2 (Cloud Application Security Assessment) review. CASA Tier 2 is required for the Google Workspace Marketplace and provides independent third-party validation of our security review for the Google Drive integration. It covers authentication flow review, OAuth scope justification, encryption practices, vulnerability management, incident response process, and privacy practices.

On the roadmap

SOC2 Type II

We are committed to SOC2 Type II as our customer base grows. The audit timeline is gated on revenue milestones rather than calendar dates so that we can do it properly when the cash flow justifies the investment. We do not publish a target date because dates we miss damage trust. If a SOC2 Type II report is a requirement for your procurement process, we are happy to walk you through our current posture and the audit timeline we are working against.

Vendor security questionnaires

We respond to standard vendor security questionnaires (SIG, CAIQ, custom forms). We maintain a reusable questionnaire response document and answer most questionnaires within five business days.

What we will not do

We will not publicly claim compliance attestation we do not yet have. If you see any vendor doing this, leave the page.

We will not train models on your data. Your knowledge is yours and only yours.

We will not share customer data across tenants for any reason, including model improvement.

Reporting a security issue

If you have found a security issue, please email security@resolvcmd.com. We will acknowledge within one business day. We do not currently run a public bug bounty program, but we appreciate responsible disclosure and will recognize researchers who report valid issues.

Other questions

For questions about our security posture, vendor questionnaires, or data handling, contact hello@resolvcmd.com and we will route to the right person.

Start Free Trial