Resources
Security
Security practices, compliance certifications, and data protection at Tork.
Security Overview
Tork is built with security as a foundational principle. We implement industry-leading security practices to protect your data and help meet compliance requirements.
SOC 2 Type II
Security controls (in progress)
Encryption
AES-256 at rest, TLS 1.3 in transit
Privacy
GDPR and CCPA compliant
API Key Security
Best practices for managing your API keys:
Use Environment Variables
Never hardcode API keys in source code
Rotate Keys Regularly
Rotate production keys every 90 days
Scope Permissions
Use the minimum permissions required
Monitor Usage
Set up alerts for unusual API activity
Separate Environments
Use different keys for dev, staging, and production
Data Handling
How we handle your data:
| Data Type | Retention | Encryption |
|---|---|---|
| Audit Logs | 90 days (configurable) | AES-256 |
| Policy Configs | Until deleted | AES-256 |
| Agent Metadata | Until deleted | AES-256 |
| Content (if stored) | 24 hours | AES-256 |
| PII (detected) | Not stored | N/A |
Content passing through Tork is processed in memory and not persisted unless explicitly configured for audit purposes.
Network Security
Infrastructure security measures:
Infrastructure
- AWS/GCP with SOC 2 certified infrastructure
- VPC isolation for all services
- Regular penetration testing
- WAF and DDoS protection
Compliance
- SOC 2 Type II (in progress)
- GDPR compliant
- CCPA compliant
- Annual third-party audits
IP Allowlisting
Restrict API access to specific IP addresses:
Webhook Security
Secure your webhook endpoints:
Security Incidents
If you discover a security vulnerability:
Responsible Disclosure
Please report security vulnerabilities to:
We respond to all reports within 24 hours and aim to resolve critical issues within 72 hours.
Request Audit Reports: Enterprise customers can request SOC 2 reports and security questionnaires from security@tork.network.