Security
Aurora Command security posture
How we secure the platform, protect your data, and log access to exports and shared artifacts.
Security at a glance
- Encryption at rest and in transit
- Scoped credentials where supported
- Role based access controls and approvals
- Access and export event logging
- Infrastructure monitoring and incident response processes
Data handling and privacy
- We retain data only as long as needed to provide the service and meet legal and security obligations.
- Customer data remains owned by the customer; Aurora acts as a processor where applicable.
- Exports and shared access can be revoked based on Trust Center tier rules and access controls.
Access controls and logging
- Role based access controls
- Approval workflows
- Export and Trust Center access logs
Integration permissions
Aurora prefers read only access. If a connector requires broader permissions, we document why.
Request security documentation
Use this request to access sensitive artifacts such as a SOC 2 report, pen test summary, or DPA.
FAQ
Do you provide a Trust Center?
Yes. Aurora Trust Center supports tiered access and exportable access logs.
Do you watermark downloads?
Yes, based on Trust Center tier rules.
Need a security packet for your buyer today?
Request security documentation or preview a sample proof pack structure.
Have a deadline? Tell us. We can prioritize export-ready proof.