SOC 2 Type II

Audited annually. Controls cover access management, encryption, availability, and change management across all infrastructure.

Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3). API keys are encrypted with per-tenant keys before storage.

SSO / SCIM Roadmap

SAML/OIDC single sign-on and SCIM provisioning are planned. Today, Stipend supports authenticated admin access, scoped API keys, and manual access revocation from the admin console.

GDPR Ready

Data processing agreements available. Right-to-erasure supported. No prompt or response content is stored or logged by Stipend.

Infrastructure

Stipend runs on isolated infrastructure with no shared tenancy at the compute layer. Our gateway processes requests in memory and does not persist prompt or completion content.

Access Control

Every action in Stipend is scoped to authenticated, authorized principals. There is no anonymous access to any API surface.

Data Handling

Stipend processes API requests to enforce budget and policy controls. We do not store, log, or inspect the content of prompts or completions passing through the gateway.

Security inquiries

For security questions, to report a vulnerability, or to request our SOC 2 report, contact security@stipend.dev.