Compliance & Accreditations
Corsa is independently audited and compliant with industry-recognized standards. These validate that our controls are not only designed properly but operating effectively over time.SOC 2 Type II
Security, availability, and confidentiality controls audited over a sustained observation period by an independent third-party.
GDPR
Compliant with EU data protection regulation.
Security by Design
Security isn’t a feature we added - it’s the foundation every component is built on. These principles guide every product decision, infrastructure change, and operational process.Tenant Isolation
Every customer’s data is fully segregated. There is no cross-tenant data access, by design.
Encryption Everywhere
Data encrypted at rest (AES-256) and in transit (TLS 1.2+). Customers can bring their own encryption keys via BYOK.
Zero-Trust Access
Least-privilege enforcement across all internal systems. Employees authenticate via SSO with hardware-based MFA. Access to production requires additional approval and is time-boxed.
Private Connectivity
Private network connectivity available for enterprises that require all traffic to stay off the public internet.
Audit Trail
Every action in the platform is logged with full context - who, what, when, and why. Audit logs are retained according to regulatory requirements.
Deep Dives
Compliance & Certifications
SOC 2 Type II, GDPR, and our audit controls in detail.
Infrastructure Security
Network architecture, encryption, secrets management, vulnerability management, and incident response.
Product Security
Authentication, access control, API key management, SSO, and audit logs.
AI Security
Privately hosted models, opt-in controls, PII guardrails, BYOK data protection, and strict data training policies.
Employee Security
Security is every employee’s responsibility - not just the security team’s.- Security training - All employees complete annual security education. Engineers complete additional secure software development training.
- Phishing resilience - Internal phishing campaigns test and train employees on recognizing social engineering attempts.
- Secure development lifecycle - Security experts are embedded early in the project lifecycle. Threat models and trust boundaries are established before implementation begins. All code changes go through peer review and automated security scanning.
Responsible Disclosure
We maintain a vulnerability disclosure program and welcome reports from independent security researchers. We engage third-party firms for regular penetration testing and publish remediation timelines.Request Our Security Package
Customers and prospects can request Corsa’s full security documentation, including:- SOC 2 Type II report
- Penetration test executive summary
- Sub-processor list
- Security questionnaire responses
Evaluating Corsa for your organization? Schedule a demo or visit corsa.finance to learn more about the platform.