Sigma5C

Security

Last Updated: March 24, 2026

Security is foundational to how we build and operate Sigma5C. This page describes the security practices, controls, and compliance posture that protect our platform, your data, and the integrity of our services.

Report a vulnerability: If you discover a security issue, please contact security@sigma5c.com. We take all reports seriously and will respond within 48 hours.

1. Infrastructure Security

Network Architecture

Server Hardening

2. Authentication and Access Control

User Authentication

  • Passwords hashed with Argon2id (memory-hard, side-channel resistant)
  • Two-factor authentication (TOTP-based 2FA) available for all accounts
  • Progressive account lockout after failed login attempts
  • Session tokens are cryptographically random (256-bit entropy)

API Key Security

  • API keys are hashed using HMAC-SHA256 before storage; plaintext keys are never persisted
  • Keys can be rotated or revoked instantly through the dashboard
  • Per-key rate limiting and usage tracking
  • Keys are scoped to specific permission levels

Role-Based Access Control (RBAC)

Access to platform features and administrative functions is controlled through defined roles:

Role Scope
User Own account, own data, own API keys
Content Admin CMS and content management
Customer Admin Organization member management
Super Admin Full platform administration

All role assignments and changes are recorded in an immutable audit log.

3. Data Protection

Encryption

Layer Method
Data in transit TLS 1.2+ (HTTPS enforced for all connections)
Data at rest Encrypted storage volumes
Passwords Argon2id hashing (not reversible)
API keys HMAC-SHA256 (not reversible)
Session tokens 256-bit cryptographic random generation

Secrets Management

AI Data Handling

We do not train AI models on your data. Customer prompts and data submitted to AI features are processed transiently to generate responses. They are not stored for training purposes and are not shared with AI model providers for their training. See our Privacy Policy for retention details.

4. Application Security

5. Monitoring and Incident Response

6. Compliance and Certifications

Current Compliance Posture

Framework Status
SOC 2 Type II Controls implemented (CC6 Logical Access fully mapped); formal audit planned
GDPR Compliant: data subject rights (export, deletion), consent audit trail, DPAs with primary processors
CCPA / US State Privacy Compliant: we do not sell personal information; deletion rights supported
PCI DSS Payment processing delegated to Stripe (PCI Level 1 certified); no credit card data touches our servers

Data Processing Agreements

We maintain executed DPAs with our primary data processors:

A complete list of sub-processors and their compliance status is available on our Third-Party Providers page.

7. Business Continuity

8. Security Practices for Customers

We recommend the following practices for your account security:

9. Enterprise Security

Enterprise customers may require additional security assurances. We support:

For enterprise security inquiries, contact security@sigma5c.com.

10. Contact

Security Team: security@sigma5c.com
Privacy Team: privacy@sigma5c.com
General Inquiries: info@sigma5c.com