Security at SenAsset
Your asset data is critical business infrastructure. We treat its security with the same seriousness. SenAsset is built on enterprise-grade security practices from the ground up.
SOC 2 Type II
Security & Availability
GDPR
EU Data Protection
CCPA
California Privacy
ISO 27001
Information Security (AWS)
AES-256
Encryption standard
TLS 1.3
Transport security
2×/year
Penetration tests
99.99%
Infrastructure uptime
How we protect your data
Encryption at Rest & in Transit
All data stored in SenAsset is encrypted using AES-256, the same standard used by financial institutions and government agencies. All data transmitted between your browser and our servers uses TLS 1.3, ensuring the strongest available transport security.
- AES-256 encryption for stored data
- TLS 1.3 for all data in transit
- Encrypted database backups
- Encrypted file attachment storage
SOC 2 Type II Compliance
SenAsset has achieved SOC 2 Type II certification, independently audited by a third-party firm. This certification validates our controls around security, availability, processing integrity, confidentiality, and privacy over a sustained period of time.
- Annual third-party audit
- Covers all 5 Trust Service Criteria
- Report available under NDA for Enterprise customers
- Continuous monitoring between audits
Penetration Testing
We partner with independent security firms to conduct comprehensive penetration tests at least twice per year. Our internal security team also performs ongoing vulnerability assessments using automated scanning tools.
- Semi-annual third-party penetration tests
- Automated vulnerability scanning (weekly)
- OWASP Top 10 coverage
- Prompt remediation and disclosure policy
Role-Based Access Control (RBAC)
SenAsset enforces granular role-based access control across the entire platform. Admins can define exactly what each user or team can see and do. Access is governed by the principle of least privilege throughout our internal systems as well.
- Granular permission roles (Admin, Manager, Member, Viewer)
- Resource-level permissions for assets and locations
- API key scoping for integrations
- Internal least-privilege access for SenAsset engineers
Audit Logs
Every action taken in SenAsset is recorded in a tamper-evident audit log. Track who created, modified, or deleted assets, changed user permissions, or accessed sensitive data. Logs are retained for a minimum of 12 months.
- Immutable audit trail for all user actions
- Timestamped with user identity and IP address
- Exportable for compliance reporting
- Retained for 12+ months (Enterprise: unlimited retention)
SSO and SAML 2.0
Enterprise customers can configure Single Sign-On (SSO) using any SAML 2.0-compliant identity provider, including Okta, Azure AD, Google Workspace, and OneLogin. We also support SCIM provisioning for automated user lifecycle management.
- SAML 2.0 SSO (Enterprise)
- Okta, Azure AD, Google Workspace, OneLogin
- SCIM 2.0 user provisioning
- Multi-factor authentication (MFA) enforcement
Infrastructure & Data Centers
SenAsset runs on Amazon Web Services (AWS) infrastructure across multiple availability zones in the US (us-east-1, us-west-2) with EU data residency available for Enterprise customers. Our infrastructure is ISO 27001 certified.
- Multi-AZ deployment for high availability
- EU data residency option (AWS eu-west-1)
- 99.99% infrastructure SLA
- Automated failover and disaster recovery
Responsible Disclosure
We believe in coordinated vulnerability disclosure and have a published security disclosure policy. If you discover a security vulnerability in SenAsset, we ask that you report it to us privately before public disclosure. We take all reports seriously.
- Dedicated security disclosure email
- Acknowledgement within 24 hours
- Target remediation within 30 days for critical issues
- Hall of Fame for responsible disclosures
Found a security issue?
We appreciate the security research community. If you've discovered a potential vulnerability in SenAsset, please report it to us privately. We commit to acknowledging your report within 24 hours and to working with you on a coordinated disclosure timeline.
Report a vulnerabilitysecurity@senasset.com · PGP key available on request
Questions about our security practices? security@senasset.com · Privacy Policy · GDPR