Security by Design
We keep your data safe. Period.
Security Layer PDF
Secure AI Middleware by DOTS.ai
This brief is built from the "Security by Design" narrative: it packs the posture-at-a-glance view, data handling policies (PII strategy, encryption, residency), identity & access controls, reliability practices, and the high-impact outcomes you can expect (lower risk, faster/safer change, easier audits).
DOTS.ai runs outside your systems, talking only through APIs/webhooks, so no sensitive data leaves your perimeter. Every agent (Infinity CRM, Data, Ops, Tech, Strategy) operates with read-only signals and transmits metadata-only summaries.
Security Posture at a Glance
Only the Right People See the Right Data
Access is scoped, reviewed, and time-bound with minimum needed privileges.
Your Data is Locked Up Tight
AES (128/192/256) at rest; TLS 1.2+ in transit with TLS 1.3 roadmap.
We Only Use What We Need
Collect/process only what's needed; prefer tokenization/redaction.
Our Code is Tested for Safety
Build & test against OWASP ASVS controls with shift-left security in CI.
Everything is Tracked and Recorded
Comprehensive audit trails, access logs, and break-glass procedures.
We Follow Industry Standards
SOC 2 Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy.
Data Handling
How We Protect Private Info
- Default to minimization
- Pseudonymize where feasible
- Manage secrets via KMS/Secret Manager
- Rotate keys regularly
Data is Safe Whether Stored or Moving
- AES at rest
- TLS 1.2+ in transit
- Migration track to TLS 1.3
- FIPS-compliant cipher suites
Your Data Stays Where You Want
- Per-customer isolation
- BYO-VPC option when required
- Data residency options
- NIST CSF alignment
Identity & Access
- Role-based access with auto-expiring credentials: Everyone gets only the access they need, and it expires automatically. We review permissions regularly.
- SSO & MFA: Strong authentication for admin and data-path roles.
Reliability & Operations
- SLOs & error budgets: Alert on multi-window burn-rate policies tied to user impact.
- Change safety: Canary/blue-green deployments with automatic rollback on SLO breach.
- Incident response: Runbooks, post-incident reviews, and captured learnings.
Development Lifecycle
- Secure defaults: Templates enforce security checks; CI pipelines block on security tests.
- Secrets management: No secrets in code; centralized KMS/Secret Manager; audit and rotation.
What This Means for You
Lower Risk
Measurable risk reduction through least-privilege design and strong cryptography.
Faster, Safer Change
SLO-aware alerting and canary releases ensure safe deployments.
Easier Audits
SOC 2-aligned controls and OWASP ASVS coverage simplify compliance.
Ready to Build Securely?
Let's discuss your security requirements and compliance needs.