Credentials and configuration are encrypted at rest. Documents never touch our infrastructure — they flow directly between source and target via the local agent running on your network.
Connector credentials and sensitive configuration are encrypted using AES-256-GCM with per-tenant envelope keys before being stored. Raw credentials are never persisted.
All API communication uses TLS 1.2 or higher. Connections using deprecated protocols or weak cipher suites are rejected at the transport layer.
AetherFlow never stores your documents. Content flows directly between source and target via the local agent running inside your network perimeter.
Multiple authentication methods, role-based access, and short-lived tokens — designed for enterprise identity management requirements.
Every query, every record, every credential is scoped to your tenant. Cross-tenant data access is architecturally impossible by design.
Strict tenant_id filtering is applied to every database query — not as application-level logic, but enforced at the data layer via Supabase Row-Level Security policies.
PostgreSQL RLS policies guarantee that even if application logic had a bug, queries would still return only your tenant's data.
Credential encryption keys are derived per-tenant. A compromise of one tenant's key cannot expose another tenant's data.
Built on SOC 2 certified providers. Every administrative action is logged, tracked, and auditable.
If you discover a security vulnerability in AetherFlow, please report it responsibly. We will acknowledge your report within 24 hours and work with you to address it promptly.
security@final-phase.comEnterprise procurement often requires security questionnaires, architecture diagrams, or compliance documentation. We support your security review process — contact us and we'll work with your security team directly.
Request Security DocsOur full Privacy Policy, Terms of Service, and GDPR/CCPA data processing terms are available for review. Enterprise customers can request a Data Processing Agreement (DPA).
We work directly with enterprise security teams. Request a demo and we'll walk you through our architecture, answer your questionnaire, and provide all the documentation your team needs.
Talk to Our Team