Security

How Carlquist protects your data and systems. For compliance details and certification roadmap, see our Trust Center.

Security Model

Carlquist operates as a middleware layer between your legacy systems and modern applications. We follow a principle of minimal data residency: adapter payloads are transformed in memory and delivered to your endpoints. We do not store, inspect, or mine your business data. Our security model is built on defense in depth, least privilege, and separation of concerns.

Controls Summary

ControlStatusDetails
TLS 1.3 (in transit)LiveAll connections encrypted with TLS 1.3. HSTS preload enabled.
AES-256 (at rest)LiveAll stored credentials and configuration encrypted at rest.
RBACLiveRole-based access control at org, project, adapter, and endpoint level.
Scoped API KeysLiveKeys scoped to specific adapters and operations. Rotation supported.
Audit LoggingLiveAll API calls, config changes, and admin actions logged with actor, IP, timestamp.
Field MaskingLivePII and sensitive fields masked at the mapping layer before delivery.
CSP / Security HeadersLiveStrict Content Security Policy, HSTS, X-Frame-Options DENY, no inline scripts or styles.
SSO / SAMLEnterpriseAvailable on Enterprise plans. SCIM provisioning planned.
SOC 2 Type IIIn ProgressAudit preparation underway. Target: Q3 2026.
Penetration TestingPlannedThird-party pen test scheduled for Q2 2026. Results available for design partners.

Encryption

In Transit

All data in transit is encrypted using TLS 1.3 with modern cipher suites. HTTP Strict Transport Security (HSTS) is enforced with preload, includeSubDomains, and a one-year max-age. Downgrade attacks are prevented at the protocol level.

At Rest

Adapter credentials, API keys, and configuration data are encrypted at rest using AES-256. Encryption keys are managed through isolated key stores with automatic rotation. Adapter payload data is processed in memory and is not persisted to disk.

Key Management

Encryption keys are stored separately from encrypted data with strict access controls. Key rotation occurs on a regular schedule. Customer-managed keys (CMK) are on the roadmap for Enterprise customers.

Access Control

Audit Logging

Carlquist maintains comprehensive audit logs for security and compliance purposes.

Events Captured

Retention & Export

Audit logs are retained for 90 days by default, with extended retention available on Enterprise plans. Logs can be exported in CSV format. SIEM integration (Splunk, Datadog, Elastic) is on the roadmap.

Secure Development Lifecycle

Infrastructure

Vulnerability Disclosure

Responsible Disclosure: If you discover a security vulnerability in Carlquist, please report it to security@carlquist.app. We acknowledge reports within 2 business days and aim to resolve critical issues within 7 days. We do not pursue legal action against good-faith security researchers.

Shared Responsibility

Carlquist SecuresCustomer Secures
Platform infrastructure and runtimeSource system credentials and access
Adapter connection encryptionSchema correctness and data quality
Audit logging and monitoringWebhook endpoint security
Key management and rotationAPI key custody and rotation cadence
Patch management and updatesUser access reviews and offboarding
Backup integrity and recoveryDownstream application security

Additional Resources