Security & compliance

Security is not a feature. It is the foundation.

Every architectural decision at Fielded starts with how the data is protected. Here is what that looks like in practice.

Posture

Ready today, extending by quarter.

SOC 2 Type IIGDPRHIPAA· roadmapISO 27001· roadmap
Six pillars

The controls behind every agent action.

Tenant isolation

Every organisation runs in a fully isolated environment. Your data never touches another tenant's infrastructure, at the database, storage, or compute layer.

Encryption, end to end

AES-256 at rest, TLS 1.3 in transit. Per-tenant encryption keys, rotated on a schedule. Customer-managed keys available on Enterprise.

Approval gates

You decide what requires human sign-off. Fielded enforces the gate — no sensitive action is irreversible without explicit confirmation.

Third-party testing

Regular penetration testing across infrastructure and application. Reports available under NDA for enterprise customers.

Incident response SLA

Critical incidents receive acknowledgement inside one hour. All security events are logged, investigated, and disclosed transparently.

Principle of least privilege

Role-scoped permissions for users, service accounts, and agents. Access reviews, session binding, and step-up auth where it matters.

Need a security review package?

We can share our SOC 2 report, pen-test summaries, DPA, and architectural overview under NDA.

Keep exploring

Adjacent surfaces in the platform.