Security at OverSkill
We implement industry-standard security controls and leverage enterprise-grade infrastructure to protect your data and applications.
Infrastructure Certifications
Inherited Compliance Model
OverSkill is hosted on Render, a platform with SOC 2 Type II and ISO 27001 certifications. This means our infrastructure inherits enterprise-grade security controls that have been independently audited. We leverage Render's security investments while implementing additional application-level protections.
SOC 2 Type II
via Render
Security controls validated by independent audit over 6+ month period
View on Render Trust CenterISO 27001:2022
via Render
International information security management standard
View on Render Trust CenterSecurity Practices
Encryption
- TLS 1.3 encryption for all data in transit
- AES-256 encryption for data at rest
- Automatic HTTPS enforcement on all endpoints
- Managed SSL/TLS certificates via Render
Access Controls
- Multi-factor authentication available for all accounts
- Role-based access control (RBAC) for team members
- Team-based resource isolation (BulletTrain)
- Automatic session expiration
- OAuth 2.0 with Google and GitHub
Infrastructure Security
- Hosted on Render (SOC 2 Type II certified)
- Built on AWS and Google Cloud Platform
- DDoS protection via Cloudflare
- Geographic redundancy across data centers
- Automated failover and disaster recovery
Security Monitoring
- 24/7 automated infrastructure monitoring
- Comprehensive audit logging for administrative actions
- Real-time anomaly detection
- Automated vulnerability scanning
- Security incident alerting
AI Security
- Prompt injection filtering on all user inputs
- Content moderation on AI-generated outputs
- No training on customer data
- Isolated AI processing per request
- Rate limiting on AI operations
Security Vulnerability Disclosure
We take security seriously and appreciate the responsible disclosure of potential vulnerabilities. If you discover a security issue, please report it to us privately.
Please include a detailed description of the vulnerability, steps to reproduce, and potential impact. We aim to acknowledge reports within 48 hours and provide regular updates on our investigation.
Data Protection
Data Processing Locations
- Primary: Oregon, USA (Render/GCP)
- EU Option: Frankfurt, Germany (Render/AWS)
- CDN/Edge: Global (Cloudflare)
Data Retention
- Account data retained while account is active
- Generated apps can be exported or deleted at any time
- Deleted data removed within 90 days (backup rotation)
- Audit logs retained for 90 days