SOC 2 Type II — In ProgressEst. completion Q4 2026

Security & Compliance

Resume Tailor is built with enterprise security requirements in mind. We are actively pursuing SOC 2 Type II certification and follow industry best practices for data protection, access control, and incident response.

Last updated: May 2026

SOC 2 Type IIIn Progress

Audit started Q2 2026, est. completion Q4 2026

TLS Encryption (Transit)Active

TLS 1.3 enforced on all connections

Data Encryption (Rest)Active

AES-256 via Upstash Redis at-rest encryption

HSTSActive

max-age=31536000; includeSubDomains

Access ControlsActive

Clerk auth, RBAC, API key gating

Audit LoggingActive

90-day privileged access audit trail

Annual Penetration TestScheduled

Scheduled Q3 2026

DPA AvailableActive

Data Processing Agreement on request

Data Infrastructure

Hosting: Resume Tailor runs on Vercel (US East region). All compute is serverless and ephemeral — no persistent application servers retain user data between requests.

Database: All persistent data is stored in Upstash Redis (US East 1 region). Upstash provides AES-256 at-rest encryption and TLS in transit. Data residency is US-only; no data is replicated to other regions without explicit configuration.

AI processing: Resume text is processed by the Anthropic Claude API. Anthropic's enterprise API does not train on customer data. Data is transmitted over TLS and not persisted beyond the request.

Authentication: Identity management is handled by Clerk. Passwords are never stored by Resume Tailor. OAuth tokens are managed by Clerk and not accessible to our application.

Payments: All payment processing is handled by Stripe. No payment card data touches Resume Tailor servers.

Access Controls

  • Multi-factor authentication available via Clerk for all accounts
  • Role-based access control (RBAC): users, org admins, site admins are strictly separated
  • API keys use SHA-256 hashing — plaintext keys are never stored
  • Admin routes require verified email match against a hardcoded allowlist
  • Organization members can only access their own org's data
  • All API endpoints enforce authentication before data access
  • Session tokens are short-lived (Clerk-managed) with automatic rotation

Security Headers

All responses from Resume Tailor include the following HTTP security headers:

Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin-when-cross-origin
Permissions-Policycamera=(), microphone=(), geolocation=()
Content-Security-Policydefault-src 'self'; frame-ancestors 'none'; …

Audit Logging

Resume Tailor maintains a server-side audit trail for all privileged data access events. Logs are retained for 90 days and include actor ID, IP address, user agent, action type, and timestamp.

Logged events include: admin data access, API key creation/rotation/revocation, org member data access, resume exports, and account deletion.

Site administrators can query the audit log via a dedicated admin interface restricted to verified admin accounts.

Data Retention

User sessions & resumesUntil account deleted
Audit logs90 days
API key usage data13 months (current + 12 prior months)
AI rate limiting buckets24 hours
Job alert matches90 days
Outplacement member recordsDuration of org license + 90 days
University enrollment recordsDuration of org license + 1 year
Stripe payment recordsManaged by Stripe per their retention policy

Incident Response

In the event of a confirmed data breach affecting personal information, Resume Tailor will:

  1. Notify affected users within 72 hours of discovery
  2. Provide a clear description of what data was affected
  3. Describe the steps taken to contain and remediate the incident
  4. Notify relevant authorities as required by applicable law (GDPR, CCPA)

Responsible Disclosure

If you have discovered a security vulnerability in Resume Tailor, please report it responsibly. Send a detailed report to security@resumetailor.ai. We will acknowledge your report within 48 hours and aim to resolve confirmed vulnerabilities within 30 days. We do not pursue legal action against researchers acting in good faith.

Enterprise & Compliance Requests

For enterprise customers requiring additional documentation — Data Processing Agreements, security questionnaires, custom DPA terms, or vendor assessment forms — please contact us.