Encryption at rest
Supabase-managed Postgres uses AES-256 for storage and snapshots.
Security
Ochre handles support conversations, customer PII, and optional AI provider keys. Here is exactly how that data is stored, who can see it, and what we have not built yet.
What we do
Supabase-managed Postgres uses AES-256 for storage and snapshots.
TLS 1.3 everywhere. The apex domain is HSTS-preloaded.
Tenant data carries org_id and row-level policies reject cross-tenant reads.
Provider keys are encrypted server-side and never exposed to client JavaScript.
Stripe, GitHub, Linear, HubSpot, Slack, and Resend payloads are verified before handler logic runs.
CSP nonces, SSRF guards, replay protection, and ongoing RLS review are part of the operating rhythm.
Not started. We will publish audit status when it begins.
Not in scope for v1. Ochre is not the right system for PHI yet.
Out of scope for the current product.
Not offered. Ochre is a managed product.
Vercel
Application hosting and edge
Global edge, primary US
Supabase
Postgres, Auth, Storage
AWS us-east-2
Anthropic
LLM inference through customer key
Customer-keyed
OpenAI
LLM inference through customer key
Customer-keyed
Resend
Transactional and outbound email
US
Stripe
Subscription billing
US / global
Send the questionnaire or book a rollout call. We will be direct about current controls and gaps.
Contact security