This page summarizes our current security posture, data handling practices, subprocessors, and procurement-relevant operating controls for evaluation by security and vendor-review teams.
Last updated
TLS 1.3 Encrypted
No Model Training
Org-Scoped Access
Data handling and model training stance
TTXLab processes customer data to deliver exercise workflows, reports, and governance tracking features. We do not use customer data to train foundation models. AI providers receive exercise data via API calls only, with no training rights. Data access is organization-scoped and controlled by authenticated membership and authorization checks.
Encryption and tenant isolation
Platform traffic is encrypted in transit using TLS 1.3. Data stored by TTXLab-managed services is encrypted at rest using AES-256 via provider-managed keys (Convex for database, Vercel for edge/serverless). Tenant data is logically isolated by organization identifiers and access checks on every protected operation.
Identity, authentication, and access control
Authentication is powered by Convex Auth with email magic links for members and invite-scoped guest sessions for exercise participants. Workspace operations enforce organization membership before data is returned. Privileged actions are restricted to authorized roles.
Logging, auditability, and incident response
Audit-relevant lifecycle events are captured for major exercise and report actions. We use this operating history to support readiness reviews, follow-up action tracking, and evidence collection for internal stakeholders.
Data retention and deletion
Exercise data, reports, and account information are retained while accounts are active. Customers can request data export or deletion by contacting support@ttxlab.com. Deletion requests are processed within 30 days, subject to any legal retention obligations. See the Privacy Policy for full retention details.
SOC 2 roadmap and shared responsibility
TTXLab is actively working toward SOC 2 Type II readiness. This certification has not yet been achieved. We are maturing controls, formalizing policies, and aligning with Trust Services Criteria. We will only represent formal attestation after an independent audit is complete. Customers remain responsible for user lifecycle decisions, scenario content, and how exported artifacts are handled after leaving the platform.
AI provider disclosure
TTXLab uses two AI providers for exercise workflows. Both are accessed via the Vercel AI Gateway as API-only integrations. Exercise data is processed through API calls and is not used for model training by either provider.
Google Gemini — powers real-time AI facilitation during exercises. Receives exercise prompts and participant context via API only. No training on customer data.
Anthropic Claude — powers AI adjudication, scoring, and report generation. Receives exercise transcripts via API only. No training on customer data.
Subprocessors
The following vendors process customer data as part of TTXLab platform operations. This list is maintained as subprocessors are added or changed.
TTXLab operates on monitored infrastructure with active incident response. We use Vercel's globally distributed edge network and Convex's real-time backend to maintain platform responsiveness. Service health is monitored continuously, and the team is alerted to degradation or outage conditions.
We do not currently publish a specific uptime percentage commitment for self-serve plans. Enterprise contracts may define stricter SLA terms, availability targets, and incident response timelines based on organizational requirements. Contact us via the contact page to discuss enterprise SLA options.
Related documentation
Review these resources for additional detail on data handling, legal terms, and security controls:
Privacy Policy — data collection, retention, and individual rights.
Security — encryption, vulnerability disclosure, and infrastructure details.
Cookie Policy — cookie usage and consent mechanisms.
Need a security package for vendor review?Request a security package through our contact page and we will provide available documentation for your procurement or security review process.