Trust Center

Security, privacy, reliability, and compliance at SankeyArt.

Last updated: September 2025

Resources

Architecture diagram · SankeyArt Download
Data flow diagram · SankeyArt Download
Security attestation ·
Excel add-in
Link
Security attestation ·
PowerPoint add-in
Link
Privacy policy Link
Terms of service Link

Compliance

GDPR
ISO 27001 In progress

We protect user data using industry-standard encryption both in transit and at rest. All connections to SankeyArt are secured via TLS 1.2+ with support for TLS 1.3, ensuring that data is encrypted while moving between your browser, Cloudflare's global edge network, and our application servers on Heroku. Weak legacy protocols such as TLS 1.0 and TLS 1.1 are disabled.

At rest, all application data is stored in Heroku Postgres databases and Redis caches, which are encrypted with AES-256 by default. File assets and backups are stored in AWS S3, also encrypted with AES-256. Encryption is always enabled, across all plans, with no opt-in required.

Key management and rotation are handled by our infrastructure providers according to their compliance frameworks (including SOC 2 and ISO 27001). This means encryption keys are securely generated, stored, and rotated without manual intervention.

Together, these measures ensure that sensitive information is protected end-to-end — whether it is being transmitted across the network or stored in our databases and file systems.

Our platform provides multiple secure ways for users to access their accounts:

  • Single Sign-On (SSO): Customers can sign in with their existing Google or Microsoft accounts, inheriting the security protections (including MFA, device checks, and conditional access policies) that those providers enforce.
  • Email + password: We support direct sign-in with email and password, safeguarded by strong password quality controls and secure reset procedures.

For flexibility, limited functionality is available without authentication so that new users can quickly test the product before creating an account.

Password protections
  • Minimum length of 8 characters, with checks against common or easily guessable values.
  • Passwords cannot consist solely of numbers or be too similar to account identifiers.
  • All password operations (creation, change, reset) occur over TLS-encrypted channels.
  • Reset links are valid for a limited time, ensuring protection against unauthorized use.
  • Authentication flows are periodically reviewed against evolving best practices.

At present, native multi-factor authentication (MFA) and enterprise integrations (Okta, SAML, Azure AD) are not yet supported. For the strongest protection, we recommend using Google or Microsoft SSO, which includes MFA and advanced account security features when enabled with your identity provider.

All user data is stored in secure cloud infrastructure hosted on Heroku and Amazon Web Services (AWS) in the United States. Both platforms maintain industry certifications such as SOC 2 and ISO 27001, ensuring that physical and logical security standards are met.

To protect against data loss, we maintain automated daily database backups. These backups are encrypted at rest, securely stored within AWS, and retained for 7 days. Backup restorations are tested on a regular basis to verify integrity and recoverability.

Provider Purpose Retention Region
Heroku Application and database hosting Ongoing US
AWS Encrypted daily database backups 7 days US

Analytics data locations and subprocessors are described in the Data governance and third-party access section.

We take a layered approach to protecting the platform, combining network-level defenses, secure development practices, and ongoing patch management.

Network and infrastructure controls
  • All traffic is routed through Cloudflare, which provides a Web Application Firewall (WAF), bot/attack mitigation, and basic intrusion detection signals.
  • The application runs on secure cloud infrastructure with built-in isolation between services and tenants.
  • TLS 1.2+ is enforced end-to-end for all services.
Secure development practices
  • Input validation and output encoding to prevent injection and XSS.
  • Strong authentication and session handling; no plaintext credentials.
  • Secrets management via environment variables / vaults; no hard-coded keys.
  • Structured logging with filters to avoid sensitive data in logs.
  • Peer code reviews before production deploys.
  • Practices aligned with the OWASP Top 10.
Patch and dependency management
  • Automated dependency scanning runs continuously.
  • Security updates are triaged and applied on a weekly cadence; critical issues are addressed promptly.

Architecture and data flow diagrams are available in the Resources section.

We continuously monitor the health and security of our platform to detect and respond to issues quickly:

  • Application monitoring: Automated systems track performance, availability, and reliability.
  • Error detection and escalation: Errors are captured in real time, and alerts are routed to our engineering team with defined escalation procedures to ensure prompt resolution.
  • Log monitoring: Application and infrastructure logs are aggregated, stored securely, and regularly reviewed for anomalies.
Audit logs (planned)

Customer-facing audit logs, which record user actions within the product, are planned for release by the beginning of 2026. These logs will be exportable and have retention periods in line with the common industry practice.

We are committed to meeting industry standards and regulatory requirements to protect user data and earn your trust.

  • GDPR: Our service is designed with GDPR principles in mind, including clear privacy disclosures, lawful bases for processing, encryption in transit and at rest, subprocessors transparency, and processes for honoring user rights (access, deletion, and rectification). While some workflows are handled manually today, we consider the service aligned with GDPR requirements and continue to enhance automation over time.
  • ISO 27001: We are actively preparing for ISO 27001 certification, with a target completion by mid-2026.
  • Security documentation: This page provides the standard security information most IT and compliance teams request for review. Additional documentation can be shared upon request.
  • Breach history and disclosure: We have had no material security incidents to date. In the event of a breach, we will notify affected users promptly in line with legal requirements and best practices.

We do not currently hold a SOC 2 report, but our security controls are modeled against similar criteria.

We are committed to transparency in how user data is handled and shared.

  • Data storage and security: User data is hosted in secure US-based data centers. See Data storage, residency and backups for more details.
  • Personal and financial data:
    • Personal data is stored in our database.
    • Financial data (such as payment details) is processed by our payment provider Stripe.
    • Certain personal identifiers (such as first name, last name, email) may be shared with subprocessors that provide analytics, customer communication, or operational services.
  • Data retention: Personal data is retained indefinitely unless a deletion request is submitted. Customers may request account deletion by contacting us directly.
  • Data deletion: We process deletion requests manually via email. Once confirmed, data is permanently erased from our systems and subprocessors to the extent applicable.
Service providers

We work with carefully selected subprocessors and service providers to deliver our services. Each provider is subject to a Data Processing Agreement (DPA) or equivalent contractual safeguards. Our subprocessors include:

Provider Purpose Data processed Region
Stripe Payment processing Billing details US
Mailchimp Email campaigns Basic profile info US
Sentry Error monitoring Basic profile info, usage data US
Google Analytics Data analytics Basic profile info, usage data US
Mixpanel Data analytics Basic profile info, usage data EU
Perplexity Data analytics Basic profile info US

Not convinced?

For any additional questions or concerns please write to us at [email protected] and we will get back to you within 24 hours.