NarrateKit Security Overview
Comprehensive security measures protecting your content and data
Last updated: January 2025 | Version: 2.1
Executive Summary
NarrateKit is an AI-powered content creation platform that handles sensitive brand information, creative assets, and strategic content. We implement enterprise-grade security measures to protect your data at every level of our infrastructure.
Key Security Highlights
- End-to-end encryption for all data transmission and storage
- SOC 2 Type II compliance framework (in progress)
- Zero-trust architecture with multi-factor authentication
- Regular third-party security audits and penetration testing
- GDPR and CCPA compliant data handling practices
Infrastructure Security
Cloud Infrastructure
- Hosting: Supabase (built on AWS infrastructure) with enterprise-grade SLA
- CDN: Global content delivery with DDoS protection
- Load Balancing: Distributed architecture with automatic failover
- Monitoring: 24/7 infrastructure monitoring and alerting
Network Security
- TLS 1.3: All connections encrypted with latest TLS standards
- HSTS: HTTP Strict Transport Security enforced
- Firewall: Web Application Firewall (WAF) with custom rules
- Rate Limiting: API rate limiting to prevent abuse
- IP Whitelisting: Available for enterprise customers
Data Protection
Encryption
- At Rest: AES-256 encryption for all stored data
- In Transit: TLS 1.3 for all data transmission
- Application Level: Sensitive fields encrypted with unique keys
- Key Management: Automated key rotation every 90 days
- Database: PostgreSQL with row-level security (RLS)
Data Isolation
- Multi-Tenancy: Logical data separation per customer
- AI Models: Brand-specific training data never cross-contaminated
- Access Controls: Role-based permissions with principle of least privilege
- Data Residency: Customer choice of data storage regions
Access Control & Authentication
User Authentication
- Multi-Factor Authentication (MFA): Required for all accounts
- SSO Integration: Support for Google, Microsoft, and SAML providers
- Session Management: Secure session tokens with automatic expiration
- Password Policy: Strong password requirements with breach detection
Authorization Framework
Brand Users
- • Campaign management
- • Document upload
- • Creator invitations
- • Analytics access
Creator Users
- • Assigned campaigns
- • AI chat access
- • Content generation
- • Read-only documents
Admin Users
- • System management
- • Viral content library
- • User administration
- • Security monitoring
AI & Model Security
AI Data Handling
- Data Isolation: Each customer's training data is kept completely separate
- Model Security: Custom fine-tuned models per brand to prevent data leakage
- Input Sanitization: All user inputs validated and sanitized before processing
- Output Filtering: AI responses filtered for sensitive information
- Audit Trail: Complete logging of all AI interactions and model usage
Third-Party AI Services
Azure OpenAI Integration
- • Your data is NOT used to train OpenAI's general models
- • All API calls are encrypted and logged
- • Data processing agreements in place with Microsoft
- • Enterprise-grade Azure OpenAI service with enhanced security
Monitoring & Incident Response
Security Monitoring
- 24/7 Monitoring: Continuous monitoring of all systems and applications
- Anomaly Detection: AI-powered detection of unusual access patterns
- Threat Intelligence: Integration with security threat feeds
- Vulnerability Scanning: Automated daily scans of all systems
- Log Analysis: Centralized logging with real-time analysis
Incident Response Plan
Response Timeline
- 0-15 minutes: Automated detection and alert
- 15-30 minutes: Security team activation
- 30-60 minutes: Containment and assessment
- 1-4 hours: Customer notification (if affected)
- 24-48 hours: Full incident report and remediation
Compliance & Certifications
Current Compliance
- ✓GDPR (General Data Protection Regulation)
- ✓CCPA (California Consumer Privacy Act)
- ✓PIPEDA (Personal Information Protection Act)
In Progress
- ◐SOC 2 Type II (Expected Q2 2025)
- ◐ISO 27001 (Planned 2025)
- ◐HIPAA (For healthcare customers)
Security Practices
Development Security
- Secure SDLC: Security integrated throughout development lifecycle
- Code Reviews: Mandatory security-focused code reviews
- Dependency Scanning: Automated scanning for vulnerable dependencies
- Static Analysis: Automated code security analysis
- Penetration Testing: Quarterly third-party security assessments
Employee Security
- Background Checks: Comprehensive screening for all employees
- Security Training: Regular security awareness training
- Access Reviews: Quarterly access permission reviews
- Incident Training: Regular incident response drills
Reporting Security Issues
Responsible Disclosure
We welcome security researchers and users to report potential vulnerabilities. We commit to:
- Acknowledge reports within 24 hours
- Provide initial assessment within 72 hours
- Keep reporters informed throughout the process
- Credit security researchers (with permission)
Security Contact:
security@narratekit.com
PGP Key: Available on request | Response time: <24 hours
Questions & Contact
For security questions, compliance requests, or to report security issues:
- Security Team: security@narratekit.com
- Compliance: compliance@narratekit.com
- Privacy Officer: privacy@narratekit.com
- General Inquiries: support@narratekit.com
Enterprise Customers: Additional security documentation, compliance reports, and security questionnaire responses are available upon request through your account manager.