Your InfoSec Governance Operating System
Portal Login
Security

Aurora Command security posture

How we secure the platform, protect your data, and log access to exports and shared artifacts.

Security at a glance

  • Encryption at rest and in transit
  • Scoped credentials where supported
  • Role based access controls and approvals
  • Access and export event logging
  • Infrastructure monitoring and incident response processes

Data handling and privacy

  • We retain data only as long as needed to provide the service and meet legal and security obligations.
  • Customer data remains owned by the customer; Aurora acts as a processor where applicable.
  • Exports and shared access can be revoked based on Trust Center tier rules and access controls.

Access controls and logging

  • Role based access controls
  • Approval workflows
  • Export and Trust Center access logs

Integration permissions

Aurora prefers read only access. If a connector requires broader permissions, we document why.

Request security documentation

Use this request to access sensitive artifacts such as a SOC 2 report, pen test summary, or DPA.

Requested docs
By submitting you agree to our Privacy Policy and Terms.
Expected response: within one business day.

FAQ

Do you provide a Trust Center?

Yes. Aurora Trust Center supports tiered access and exportable access logs.

Do you watermark downloads?

Yes, based on Trust Center tier rules.

Next step
Need a security packet for your buyer today?
Request security documentation or preview a sample proof pack structure.
Have a deadline? Tell us. We can prioritize export-ready proof.