Public Security Documentation • v2026.1

AuditMate Security Whitepaper

A technical deep-dive into data protection, encryption standards, and architectural security for the AuditMate platform.

01. Executive Summary

AuditMate is built on the principle of Least Privilege. Our architecture is designed to collect only the evidence required for compliance audits without maintaining persistent backdoors into your production infrastructure. This document outlines the controls we use to protect client data.

02. Data Encryption Standards

We utilize industry-standard cryptographic protocols to protect data both at rest and in transit.

Encryption at Rest

Sensitive credentials (API Keys, AWS Access Secrets) are encrypted using AES-128-CBC via the Fernet (symmetric encryption) recipe.

Standard: Fernet (Cryptography.io)
Key Derivation: PBKDF2HMAC
Storage: PostgreSQL (Encrypted Column-level)

Encryption in Transit

All data transmitted between our servers, your infrastructure, and the end-user is encrypted using TLS 1.3. We enforce HSTS (HTTP Strict Transport Security) to prevent downgrade attacks.

03. Infrastructure Security

AuditMate is hosted on hardened cloud infrastructure with the following protections:

04. Authentication & Access

"AuditMate employees do not have access to client-stored AWS or GitHub credentials. Encryption keys are managed via an automated rotation system with limited human access."

05. Compliance Disclosures

While AuditMate helps you achieve SOC2, we also maintain our own internal security posture:

Vulnerability Management
Weekly automated dependency scanning via Dependabot and Snyk.
Incident Response
24/7 monitoring and automated alerting via PagerDuty for unauthorized access attempts.