Security

How we protect your data and ensure the security of our platform.

Security Overview

At SENTD, security is foundational to everything we build. We handle millions of emails containing sensitive information, and we take that responsibility seriously. Our security practices are designed to protect your data at every layer of our infrastructure.

Data Encryption

Encryption in Transit

  • All API traffic is encrypted using TLS 1.2 or higher
  • We enforce HTTPS for all web traffic - HTTP requests are redirected
  • We use modern cipher suites and disable legacy protocols (SSLv3, TLS 1.0, TLS 1.1)
  • Email transmission to providers uses TLS when supported
  • We maintain an A+ rating on SSL Labs

Encryption at Rest

  • All data at rest is encrypted using AES-256
  • Database encryption for all stored data
  • Encrypted backups with separate encryption keys
  • API keys are hashed and never stored in plaintext
  • Passwords are hashed using bcrypt with appropriate work factors

Infrastructure Security

Cloud Infrastructure

  • Hosted on infrastructure providers with SOC 2 Type II and ISO 27001 certifications
  • Multi-region deployment for high availability
  • Automated failover and disaster recovery
  • Regular infrastructure security assessments

Network Security

  • Web Application Firewall (WAF) to protect against common attacks
  • DDoS protection and mitigation
  • Network segmentation and isolation
  • Intrusion detection systems
  • Regular vulnerability scanning

Monitoring and Logging

  • 24/7 infrastructure monitoring
  • Centralized logging with tamper protection
  • Real-time alerting for security events
  • Audit logs retained for 90 days

Access Control

API Key Security

  • Scoped API keys with granular permissions
  • API keys are shown only once at creation - we cannot retrieve them
  • Support for multiple API keys per account
  • Ability to revoke keys instantly
  • API key rotation recommendations and support

Account Security

  • Secure authentication via OAuth providers
  • Session management with secure, httpOnly cookies
  • Automatic session expiration
  • Account activity logging

Team Access

  • Role-based access control (RBAC)
  • Separate permissions for viewing, editing, and admin actions
  • Audit trails for team member actions
  • Ability to revoke team member access instantly

Data Privacy

  • We do not read your email content - content is processed only for delivery
  • Email content is automatically deleted within 30 days
  • We do not sell your data to third parties
  • Limited employee access to customer data on a need-to-know basis
  • Data access is logged and auditable
  • GDPR and CCPA compliant data handling

For more details, see our Privacy Policy.

Compliance

Regulatory Compliance

  • GDPR - General Data Protection Regulation compliance for EU users
  • CCPA - California Consumer Privacy Act compliance
  • CAN-SPAM - Tools and enforcement to ensure email compliance
  • CASL - Canadian Anti-Spam Legislation support

Data Processing Agreement

We offer a Data Processing Addendum (DPA) for customers who require one for GDPR compliance. Contact legal@sentd.io to request a signed DPA.

Email Security

Email Authentication

  • SPF - Sender Policy Framework to prevent spoofing
  • DKIM - DomainKeys Identified Mail for email signing
  • DMARC - Domain-based Message Authentication support

Anti-Abuse Measures

  • Automated spam detection and prevention
  • Malware scanning for attachments
  • Phishing detection systems
  • Rate limiting to prevent abuse
  • Bounce and complaint monitoring
  • Suppression list management

Incident Response

We have a documented incident response plan that includes:

  • Defined roles and responsibilities
  • Incident classification and severity levels
  • Communication procedures
  • Containment and remediation steps
  • Post-incident review and improvement

Breach Notification

In the event of a data breach affecting your data, we will:

  • Notify affected customers within 72 hours (or as required by law)
  • Provide details about the nature and scope of the incident
  • Describe the steps we are taking to address it
  • Offer guidance on any actions you should take

Security Reporting

Responsible Disclosure

We appreciate the security community's efforts to help keep SENTD secure. If you discover a security vulnerability, please report it to us responsibly:

Please include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Your contact information

We will acknowledge receipt within 48 hours and work with you to understand and address the issue. We request that you do not publicly disclose the vulnerability until we have had time to address it.

Contact

For security-related questions or concerns: