Security Overview
This page summarizes the current security posture and operating principles for WaverSec Protect. It is meant to help customers understand the present design and security approach.
This page is a summary of current practices, not a guarantee that every control will remain unchanged forever. A negotiated security addendum or order form will control if the parties sign one.
Search section titles and document text.
Security principles
WaverSec Protect is designed around data minimization, least privilege, and reducing the amount of retained message data in WaverSec systems.
The current architecture emphasizes local or customer-side processing for core controls and uses optional cloud intelligence only where configured by the customer.
Access control
Administrative access to customer environments is mediated through authenticated product accounts and role-based application flows. Internal access to production systems is limited to personnel and subprocessors who require that access to operate or secure the service.
Transport and platform protection
Supported API communications use transport encryption. Service endpoints also use validation, abuse controls, and rate-limiting patterns intended to reduce misuse and protect platform stability.
Application and operational security
WaverSec uses logging, monitoring, and controlled operational workflows to support service reliability and incident response. Product settings, tokens, and API key lifecycle controls are managed through the service and related backend systems.
Data minimization
WaverSec Protect is designed so that message bodies, recipient lists, and attachment files are not retained in WaverSec application databases as normal service records. Operational data such as account, configuration, usage, and billing data is still retained where needed to operate the service.
Incident response
WaverSec investigates confirmed security incidents and takes reasonable containment, remediation, and communication steps appropriate to the incident. Where WaverSec is acting as processor for customer data, relevant customers will be notified without undue delay after awareness of a confirmed incident affecting their personal data, subject to legal and operational constraints.
Subprocessors and third parties
WaverSec currently uses Clerk for identity and authentication, Vercel for application hosting and edge delivery, Neon for managed database hosting, PostHog for optional analytics, and OpenAI and Anthropic for optional AI capabilities that a customer enables.
Those providers are selected and used as part of operating the service, and data shared with them is limited to what is reasonably needed for the relevant function.