Skip to main content
← Security overview

Compliance

Last updated: March 6, 2026

24 / 25
MVSP Controls Met

The Minimum Viable Secure Product checklist is an industry baseline maintained by Google, Okta, Salesforce, and Slack. It defines 25 security controls that enterprise buyers evaluate first. Our only remaining gap requires a paid third-party penetration test.

Regulatory & Compliance Frameworks

Abundera addresses 10 regulatory frameworks across financial services, data protection, health data, payments, and AI governance. Click any framework below to jump to its detailed assessment.

MVSP 24/25 GLBA Compliant GDPR Aligned CCPA Compliant HIPAA Aligned PCI DSS SAQ A E-SIGN Compliant DORA Aligned EU AI Act Aligned SOC 2 Aligned
FrameworkScopeStatusKey Documents
MVSPSecurity baseline (25 controls)24/25 MetSecurity overview
GLBAU.S. financial privacy (Safeguards Rule)CompliantFinancial Privacy Notice
GDPREU data protection regulationAlignedPrivacy Policy, DPA
CCPA/CPRACalifornia consumer privacyCompliantPrivacy Policy
HIPAAHealth data safeguardsEquivalentAvailable upon request
PCI DSSPayment card securitySAQ AVia Stripe
E-SIGN ActElectronic communications consentCompliantTerms of Service
DORAEU digital operational resilienceAlignedAvailable upon request
EU AI ActAI system regulationAlignedAvailable upon request
SOC 2Trust service criteria auditAlignedSecurity overview

Supporting legal documents: Terms of Service · Privacy Policy · Data Processing Agreement · Security Overview. Internal compliance documentation (WISP, DPIA, ROPA, data retention policy, incident response plan, risk register, vendor assessments) is available upon request to enterprise customers and auditors at security@abundera.ai.

MVSP Control Details

Business Controls

ControlStatusNotes
1.1 Vulnerability reportsMetsecurity@abundera.ai, VDP, security.txt
1.2 Customer testingMetPentest authorization policy documented; customers may test with prior written approval
1.3 Self-assessmentMetThis page
1.4 External testingPlannedThird-party pentest planned for Phase 2
1.5 TrainingMetSecurity-first development demonstrated byautomated checks, passkey-only auth, AES-GCM encryption, and comprehensive security documentation
1.6 ComplianceMetThis page documents compliance posture; Cloudflare certifications inherited
1.7 Incident responseMetDocumented incident response plan with severity levels and response procedures
1.8 Information security policyMetFormal information security policy with data classification, vendor management, access control, and encryption requirements

Application Design Controls

ControlStatusNotes
2.1 Single sign-onMetWebAuthn/FIDO2 passkey-only authentication (AAL2/AAL3) — exceeds SSO security requirements; no passwords or shared secrets
2.2 HTTPS-onlyMetHSTS preloaded, TLS 1.3, upgrade-insecure-requests CSP directive
2.3 Security headersMet10 security headers including CSP, HSTS, COOP, CORP, Permissions-Policy, X-DNS-Prefetch-Control
2.4 Password policyMetNo passwords exist — passkey-only architecture eliminates this attack surface entirely
2.5 Security librariesMetShared validation library and crypto utilities (Web Crypto API) across all endpoints
2.6 Dependency patchingMetAutomated npm audit runs on every deployment; critical/high vulnerabilities block the deploy pipeline
2.7 LoggingMetAuth events logged with IP, timestamp, and outcome; admin audit log; Cloudflare Workers and analytics logging
2.8 EncryptionMetTLS 1.3 in transit, AES-GCM at rest for sensitive fields, git-crypt for secrets in source control

Application Implementation Controls

ControlStatusNotes
3.1 List of sensitive dataMetFormal data classification policy with four sensitivity levels
3.2 Data flow diagramMetVisual data flow diagram with encryption boundaries documented on this page
3.3 Vulnerability preventionMetStrict CSP (zero unsafe-inline), input validation, rate limiting,automated security checks per deploy, pre-deploy audit gate

Operational Controls

ControlStatusNotes
4.1 Physical accessMetServerless on Cloudflare (SOC 2 Type II, ISO 27001) — physical security inherited from certified infrastructure
4.2 Logical accessMetAdmin/user RBAC enforced at middleware layer; role assignments documented; single-person team with inherent access review
4.3 Sub-processorsMetPublished sub-processor list with security assessments
4.4 Backup and recoveryMetD1 automatic daily backups; documented RTO/RPO targets and restoration procedures
4.5 Logging and monitoringMetAuth event logging, admin audit trail, Cloudflare Workers logs, Web Analytics, and real-time rate limit monitoring
4.6 Risk assessmentMetFormal risk register with 8 identified risks scored by likelihood and impact, reviewed quarterly
4.7 Data retentionMetFormal retention schedule for all data types; delete-on-request with full account deletion process

Infrastructure Partner Certifications

Abundera runs entirely on Cloudflare's platform. By building on certified infrastructure, we inherit their physical security, network security, and data center operations certifications without needing to maintain our own data centers.

CertificationScope
SOC 2 Type IIAnnual independent audit of security, availability, and confidentiality controls
ISO 27001Information security management system covering global operations
ISO 27701Privacy information management extension (GDPR-aligned)
ISO 27018Protection of personally identifiable information in public clouds
PCI DSS 4.0 Level 1Payment card industry data security standard
FedRAMP ModerateU.S. federal government cloud security authorization
CSA STARCloud Security Alliance security assessment
C5German Federal Office for Information Security cloud computing standard

Full details: Cloudflare Trust Hub

Data Handling

Abundera processes sensitive financial, health, and personal data. All data is classified into four sensitivity levels: Public, Internal, Confidential, and Restricted.

Sensitive Data Types

Data TypeClassificationProtection
Authentication credentials (passkeys, TOTP secrets)RestrictedAES-GCM encryption, private keys never leave user's device
Bank transactions and balancesRestrictedAES-GCM encryption at rest, read-only Plaid access, user-controlled
Health recordsRestrictedAES-GCM encryption at rest, access limited to user's session
Email address, phone numberConfidentialEncrypted at rest (D1), TLS 1.3 in transit
Financial summaries (aggregated)ConfidentialEncrypted at rest, session-scoped access
Request log entriesConfidentialAdmin-only access, 90-day retention
Auth audit and admin action logsConfidentialAdmin-only access, 3-year retention (GLBA)

Data Flow

TLS 1.3 encrypted end-to-endUser DeviceWebAuthn + HTTPSCLOUDFLARE EDGE (300+ PoPs)DDoS · WAF · CDN · TurnstileCDN CacheStatic assets (Public)Workers FunctionsAuth · API · Business LogicKV StoreRate limits · SessionsAES-GCMD1 DatabasePlaidRead-only financial dataResendTransactional emailAbundera-controlledThird-party (SOC 2 certified)Application-layer encryption

Restricted data (bank transactions, health records, TOTP secrets) is encrypted with AES-GCM at the application layer before being stored in D1, on top of Cloudflare's own encryption at rest.

Data We Do Not Collect

  • Social Security numbers
  • Credit card numbers (Plaid handles this; we never see card data)
  • Passwords (passkey-only architecture)
  • Biometric data (processed on-device by WebAuthn; never transmitted)
  • Location data (Permissions-Policy blocks geolocation API)
  • Browsing history from other sites

Incident Response

Abundera maintains a documented incident response plan covering detection, containment, eradication, recovery, and post-incident review.

SeverityResponse TimeExample
Critical< 1 hourActive data breach, credential compromise
High< 4 hoursExploitable vulnerability in production, account takeover
Medium< 24 hoursVulnerability discovered but not exploited
Low< 72 hoursLow-severity dependency CVE, configuration drift

In the event of a confirmed data breach, affected users will be notified within 72 hours via email with details of what happened, what data was involved, and what actions they should take.

Vulnerability Management

Vulnerabilities are triaged by CVSS score and fixed according to these SLAs:

SeverityCVSSFix SLA
Critical9.0 – 10.072 hours
High7.0 – 8.930 days
Medium4.0 – 6.990 days
Low0.1 – 3.9Next release cycle

Every deployment is gated by an automated security audit that runs checks across 127 categories: data isolation, secret leakage, authentication, headers, injection defenses, encryption, input validation, audit log coverage, sensitive data in URLs, open redirect protection, error information disclosure, structural integrity, messaging consistency, logging hygiene, compliance consent, client trust boundaries, and security tooling infrastructure. Critical failures block the deployment automatically.

To report a vulnerability, see our Vulnerability Disclosure Policy or email security@abundera.ai.

Sub-Processor List

These third-party services process Abundera user data. All hold SOC 2 Type II certification or equivalent.

CompanyPurposeLocation
Cloudflare, Inc.Infrastructure (hosting, database, CDN, DDoS protection, bot detection)Global (300+ locations)
Plaid, Inc.Read-only bank account and transaction dataUnited States
Zoho ZeptomailTransactional email delivery — primary (verification codes, notifications, alerts)United States
ResendTransactional email delivery — fallback providerUnited States
Twilio, Inc.SMS notifications and two-way SMS commands (account alerts, recovery notifications)United States
Stripe, Inc.Subscription billing and payment processing (Checkout, Customer Portal, Webhooks)United States
Amazon Web Services (AWS KMS)Envelope encryption key management (master key storage, data encryption key generation)United States
Lob, Inc.Physical mail delivery for Abundera Letters (certified mail, dispute letters, notifications)United States

No user data is shared with advertising networks, analytics vendors, or third-party AI model providers. Abundera runs AI models on private, dedicated infrastructure.

GLBA Compliance

Abundera voluntarily complies with the Gramm-Leach-Bliley Act (GLBA) Safeguards Rule given the sensitivity of the financial data we handle.

RequirementStatusImplementation
Written Information Security Program (WISP)MetFormal Written Information Security Program (WISP) with data classification, access control, encryption requirements, and incident response procedures. Available upon request
Financial Privacy NoticeMetPublished in Privacy Policy §7 covering NPI collection, sharing, and opt-out rights
Qualified Individual designatedMetFounder serves as designated security officer responsible for WISP oversight and compliance
Vendor security assessmentsMetAll 8 sub-processors evaluated for SOC 2 certification, encryption practices, and data handling. Documented on DPA page

HIPAA-Aligned Safeguards

Abundera is not a HIPAA covered entity or business associate. We voluntarily implement safeguards aligned to HIPAA Security Rule requirements for all health-related financial data (healthcare costs, insurance premiums, medical expenses, HSA/FSA data).

SafeguardStatusImplementation
Health data encrypted (AES-GCM)MetAll health data fields encrypted at application layer with AES-GCM before storage, on top of Cloudflare's infrastructure encryption
Access controls with audit loggingMetRole-based access, passkey authentication (AAL2/AAL3), every access logged with user ID, timestamp, and action
Minimum necessary standardMetInternal systems access only specific health data fields required for the requested operation; no bulk access
Breach notification within 72 hoursMetDocumented incident response plan with 72-hour notification SLA for breaches involving health data
Data classified as "Restricted"MetHealth records carry our highest classification level with strictest access controls and encryption requirements

CCPA/CPRA Compliance

Abundera complies with the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA) for all California residents.

RightStatusHow to Exercise
Right to know (data export)MetSettings > Data Export provides full JSON download of all personal data, including control plane and shard data
Right to delete (account closure)MetSettings > Close Account initiates 30-day grace period followed by permanent deletion of all data
No sale of personal informationMetAbundera does not sell, rent, or share personal information with third parties for advertising or marketing. No "Do Not Sell" opt-out needed
Sensitive data protectionsMetFinancial data, health data, and authentication credentials classified as Restricted with AES-GCM encryption and audit logging

GDPR Alignment (EU General Data Protection Regulation)

Abundera aligns with the EU General Data Protection Regulation (Regulation 2016/679) to ensure readiness for EU users. While currently US-based, we implement GDPR-equivalent protections for all users regardless of location.

GDPR RequirementStatusImplementation
Lawful basis for processing (Art. 6)MetContract performance (financial services), legitimate interest (security), explicit consent (health data, marketing). Documented in Privacy Policy
Consent requirements (Art. 7)MetGranular, unbundled consent checkboxes at registration — separate for Terms, Privacy, age verification, electronic communications, and health data. Consent timestamp and IP recorded
Right of access / portability (Art. 15, 20)MetSettings > Data Export provides full JSON download of all personal data including control plane and financial shard data
Right to erasure (Art. 17)MetSettings > Close Account initiates 30-day grace period, then automated permanent deletion of all user data across control plane and data shards
Data minimization (Art. 5(1)(c))MetNo SSNs, no passwords, no biometrics, no location data, no browsing history collected. Plaid access is read-only. See Data Handling for full list
Data Protection Impact Assessment (Art. 35)MetFormal DPIA completed covering financial and health data processing. Available upon request
Records of Processing Activities (Art. 30)MetROPA maintained documenting all processing activities, legal bases, data categories, recipients, and retention periods
Data Processing Agreement (Art. 28)MetPublished DPA covering all 8 sub-processors with security assessments and contractual safeguards
Breach notification (Art. 33, 34)Met72-hour notification SLA for data breaches. Documented incident response plan with severity levels and escalation procedures
Privacy by design (Art. 25)MetAES-GCM encryption at rest, passkey-only auth (no passwords), tier-based data isolation,automated security checks per deploy

E-SIGN Act Compliance

Abundera complies with the U.S. Electronic Signatures in Global and National Commerce Act (E-SIGN Act) for all electronic communications and consent.

RequirementStatusImplementation
Electronic communications consentMetExplicit consent checkbox at registration: "I consent to receive account-related communications electronically, including security alerts and billing notices"
Right to withdraw consentMetUsers may close their account at any time via Settings > Close Account, which stops all electronic communications
Consent records retainedMetConsent timestamp, IP address, and version recorded in database at time of registration

PCI DSS Compliance

Abundera uses Stripe for all payment processing. No credit card numbers, CVVs, or payment credentials ever touch Abundera servers.

RequirementStatusImplementation
Cardholder data never stored or processedMetStripe Checkout handles all payment flows. Card data never enters our systems — qualifies as SAQ A (no cardholder data environment)
PCI DSS Level 1 certified processorMetStripe is a PCI DSS Level 1 Service Provider (highest level). See Stripe Security
Webhook signature verificationMetAll Stripe webhooks verified using HMAC signature before processing to prevent forgery

Data Retention

Abundera maintains a formal data retention policy with defined periods for each data category.

RequirementStatusImplementation
Formal retention policyMetDefined retention periods for all data categories documented in Privacy Policy §10
Automated deletion on account closureMet30-day grace period, then permanent deletion. Vault tier: entire dedicated database instance dropped
7-year financial record retention (IRS)MetFinancial records retained in anonymized format for 7 years per IRS requirements, then permanently deleted
Request log retention (90 days)MetRequest logs (method, path, status, duration, IP) automatically purged after 90 days. Owner-only manual purge available via admin panel
Audit log retention (3 years)MetAuthentication audit logs and admin action logs retained for 3 years per GLBA Safeguards Rule requirements (16 CFR 314.4(c)(8))

EU AI Act — Out of Scope

Abundera utilizes deterministic algorithms only. No probabilistic AI/ML models are used for financial decision-making, advice, or risk scoring. The platform does not deploy general-purpose AI systems, high-risk AI applications, or automated decision-making that affects users' financial outcomes.

RequirementStatusImplementation
AI features classified as "limited risk"MetAll AI features are informational only (projections, insights, scenario modeling). No autonomous financial decisions or high-risk classifications
Transparency obligationsMetAll AI-generated outputs include clear disclaimers: "not financial advice." Users are informed when viewing AI-generated content
Human oversightMetUsers maintain full control. AI features can be disabled. No autonomous actions without explicit user approval via trust level system
August 2, 2026 compliance deadlineOn TrackCore requirements (transparency, human oversight, risk classification) already met. Monitoring final regulatory guidance for full compliance before deadline

DORA Readiness (EU Digital Operational Resilience Act)

Abundera proactively aligns with the EU Digital Operational Resilience Act (Regulation 2022/2554), fully applicable since January 17, 2025. While DORA does not currently apply to Abundera (US-based, no EU financial entity customers), we maintain alignment with its five pillars for EU market readiness.

DORA PillarStatusImplementation
Pillar 1: ICT Risk ManagementAlignedGLBA WISP, formal information security policy, ICT asset inventory, AES-GCM encryption, WebAuthn + TOTP access controls, incident response plan, structured logging with D1 persistence
Pillar 2: Incident ReportingAlignedIncident classification matrix with 4 severity levels, response times from <1hr to <72hr, 72-hour breach notification SLA, request correlation IDs for forensics
Pillar 3: Resilience TestingAlignedAutomated security audit (checks / 127 categories) per deploy, continuous pentest program (908 attack simulations / 44 categories), 4,864 unit tests, weekly OWASP ZAP scans, external pentest planned. TLPT exempt (microenterprise)
Pillar 4: Third-Party RiskAligned8 sub-processors documented with SOC 2 status, DPA page published, ICT concentration risk assessed (all-Cloudflare stack documented with exit strategy)
Pillar 5: Information SharingPlannedVoluntary threat intelligence sharing policy to be formalized when operational

Full DORA compliance program documented internally with ICT asset inventory (14 assets), concentration risk assessment, incident classification matrix, BCP/DR targets (RPO: 24hr, RTO: 4hr), and phased compliance roadmap. Proportionality principle (Article 4) applies — Abundera qualifies as a microenterprise with simplified requirements. Internal DORA documentation is available upon request at security@abundera.ai.

SOC 2 Roadmap

Abundera is building toward SOC 2 Type II certification on a phased timeline tied to customer demand.

PhaseStatusScope
Phase 1CompleteSecurity policies, MVSP self-assessment (24/25), VDP, sub-processor transparency, risk register, data retention, backup & recovery, business continuity plan, change management policy, access review process, alerting & monitoring, continuous internal pentest program (908 tests / 44 categories)
Phase 2PlannedAnnual third-party penetration test (vendor selected, quote received) — supplements the existing continuous internal pentest program and is the only remaining MVSP gap
Phase 3PlannedCompliance platform (Vanta/Sprinto), SOC 2 Type I audit
Phase 4PlannedSOC 2 Type II certification, ongoing annual re-audit

Accepted Design Tradeoffs

Security engineering involves tradeoffs. We document ours transparently.

TradeoffResidual RiskRationale & Mitigations
SRI not applied to Cloudflare CDN scriptsLowCloudflare Web Analytics (beacon.min.js) and Turnstile (api.js) are auto-updated by Cloudflare on their own release cycle — any SRI hash would break on update. Mitigated by: CSP restricts script sources to explicit allowlisted domains, both scripts are first-party Cloudflare (same vendor as our hosting infrastructure), and Turnstile is only loaded on public forms.
COEP credentialless (not require-corp) on static pagesLowFull COEP require-corp would require all cross-origin resources (Plaid Link, Stripe.js, Turnstile iframes) to send their own CORP response header, which they don't. Using credentialless allows cross-origin loading without credentials while still enabling cross-origin isolation. API routes use the stricter require-corp. Mitigated by: COOP same-origin and CORP same-origin on all responses provide Spectre protection.

Questions about our security or compliance posture? Contact security@abundera.ai.

← Security overview