SOC 2 Type II

Audited annually. Controls cover access management, encryption, availability, and change management across all infrastructure.

Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3). API keys are encrypted with per-tenant keys before storage.

SSO / SCIM

SAML 2.0 and OIDC for single sign-on. SCIM for automated user provisioning and deprovisioning synced with your identity provider.

GDPR Ready

Data processing agreements available. Right-to-erasure supported. No prompt or response content is stored or logged by Stipend.

Infrastructure

Stipend runs on isolated infrastructure with no shared tenancy at the compute layer. Our gateway processes requests in memory and does not persist prompt or completion content.

Access Control

Every action in Stipend is scoped to authenticated, authorized principals. There is no anonymous access to any API surface.

Data Handling

Stipend processes API requests to enforce budget and policy controls. We do not store, log, or inspect the content of prompts or completions passing through the gateway.

Security inquiries

For security questions, to report a vulnerability, or to request our SOC 2 report, contact security@stipend.dev.