LetspingLetsPing
← Trust & Compliance

InfoSec Checklist

Common security and compliance questions mapped to our documentation and actual behavior. Use this for vendor questionnaires and security reviews.

QuestionAnswerReference / Where to look
Encryption at rest?YesSupabase AES-256 disk encryption; API keys hashed (SHA-256).
Encryption in transit?YesTLS 1.3 (HTTPS) for all API and webhook traffic.
Client-side / E2E encryption?PartialOptional LETSPING_ENCRYPTION_KEY; we never see plaintext when enabled.
Audit logs?YesStructured audit logs; configurable retention (14d Free, 60d Pro); export by project/date.
PII in logs?PartialFirewall block events redact email/SSN-like patterns; we recommend you avoid PII in payloads.
Access control / tenant isolation?YesAll data scoped by project and org; no cross-tenant access.
Authentication (dashboard)?YesSupabase Auth (email, GitHub, Google); MFA where supported.
API key storage?YesKeys hashed before storage; we never store or display plaintext.
Webhook signing?YesHMAC-SHA256 with timestamp; 5-min replay window.
Data residency / location?YesData processed and stored in the United States.
Subprocessor list?YesUpstash, Supabase, Vercel, Stripe; full table in Privacy.
DPA available?YesTemplate at /legal/dpa; signed DPA via legal@letsping.co.
No AI training on customer data?YesWe do not train or fine-tune on your data; no generative use of payloads.
Rate limiting?YesPer-key token buckets (ingest, agent APIs); fail-closed for agent signup when Redis down.
Idempotency?YesIdempotency keys supported on ingest and handoff-outcome (24h in Redis).
Threat model / OWASP coverage?PartialDocumented in Infosec guide; tenant isolation, crypto, injection guardrail.

For more detail: Trust & Compliance, Security, Privacy, Trust anchor (architecture).