At Trainified, protecting your data is paramount. This page outlines our commitment to platform security and compliance measures.
Encryption at rest (AES-256-GCM for secrets, KMS for storage) and in transit (TLS 1.3).
Row-Level Security (RLS) enabled on all multi-tenant database tables.
SOC 2 Type I audit preparation underway (Target: Q3 2025).
Secure hosting on AWS infrastructure in US regions (us-west-2).
User access is managed through robust authentication mechanisms:
We ensure your data remains isolated and inaccessible to other tenants:
datasets
, fine_tuning_jobs
, and fireworks_fine_tuning_jobs
.auth.uid()
).Data is protected both while stored and during transmission:
Handling of sensitive credentials and application secrets:
ENCRYPTION_KEY
(used for encrypting user keys) and other backend service credentials (like database passwords, AWS keys) are securely stored using AWS Secrets Manager in production (Supabase Vault may be used in development environments).Security controls applied at each stage of the data processing pipeline:
Upload: Client-side checks enforce PDF file type and 10MB size limit. The /api/upload
endpoint requires authentication, performs JWT verification, validates MIME type server-side, and assigns UUID-based keys for S3 storage.
Extract: The /api/extract
endpoint requires authentication. Text extraction via AWS Textract uses secure, server-side AWS credentials managed via IAM roles.
Process Job: The /api/process
endpoint requires authentication to queue jobs. The background job queue (Redis via Bull) is secured with password authentication and TLS encryption (if configured via REDIS_URL
).
Fine-Tune: API calls to external providers (OpenAI, Fireworks AI) are made server-to-server from our backend or workers. User API keys are decrypted just-in-time on the server and never exposed client-side.
Download: The /api/download
endpoint requires authentication and generates short-lived (15-minute expiry), secure presigned URLs for accessing generated files directly from S3.
Cleanup: The /api/cleanup
endpoint requires authentication for deleting temporary S3 objects.
Our cloud infrastructure is designed with security best practices:
us-west-2
region (unless an optional EU region is selected).We continuously monitor the platform and have procedures for responding to incidents:
Our ongoing commitment to meeting industry compliance standards:
We value the security community. If you believe you've discovered a security vulnerability in our platform, please notify us immediately at security@trainified.com.
We are committed to working with researchers who submit security reports. We follow a 90-day coordinated disclosure policy and maintain a public Hall of Fame to recognize contributions (details available upon request).
Policies regarding how long your data is stored and how it is removed: