Enterprise Security
At CurieTech AI, security is foundational. Our multi-tenant SaaS platform is built on secure, enterprise-grade architecture and complies with SOC 2 Type II standards. All data is encrypted both at rest and in transit, and customer data is never used to train our AI models.
We are committed to safeguarding your code, data, and workflows with strict controls, transparent practices, and enterprise-ready features.
Core Security Pillars
Code Security
Zero Data Retention (ZDR): Prompts and outputs are never stored, logged, or reused. We maintain strict agreements with our model providers to enforce ZDR.
End-to-End Encryption: Data in transit is secured with TLS, while AES-256 encryption protects all stored data.
Strict Data Isolation: Each customer's environment is logically isolated, preventing any cross-tenant data exposure.
Governance, Risk, and Compliance
SOC 2 Type II Certification: Our security and operational practices are independently audited against SOC 2 standards.
Independent Testing: External security experts regularly conduct penetration tests and vulnerability assessments to validate and improve our controls.
Secure Code Execution
Repository Access and Sync
- CurieTech AI connects only to the repositories you explicitly authorize.
- Repositories are accessed at runtime, only when a task begins.
- Code is held in a temporary, encrypted cache with a fixed time-to-live (TTL). Once expired, the cache is automatically cleared.
- After task completion, you can delete the task, and CurieTech AI will have no further visibility into your repository or codebase.
Test Runners
Cloud Test Runners: Fully managed SaaS environments that scale on demand, using encrypted, time-bound caches.
Private Test Runners: Deploy CurieTech AI test runners inside your infrastructure—within your VPC or behind a VPN—for complete isolation and maximum control.
Single Sign-On (SSO)
CurieTech AI integrates with SSO providers to support federated authentication and enterprise-grade access management.
Summary
CurieTech AI is built with enterprise-grade security at its core. From zero data retention and strong encryption to SOC 2 compliance, repository isolation, and secure execution environments, we ensure your code and data remain fully protected at every stage.