Security and privacy run in our veins. Our unique approach to securing 3rd party scripts, combining cutting-edge technology with AI expertise, sets us apart in protecting B2B SaaS, eCommerce, and websites utilizing third-party scripts.
At cside, we prioritize the security and privacy of our users. We are committed to protecting your personal information and ensuring a safe environment for all our services.
Each cside employee is tasked with maintaining compliance with applicable frameworks. We hold each other accountable and use tools to continuously monitor and audit our actions and systems.
Our policies are based on the following foundational principles:
Least Privilege Access
Access is limited to those with a legitimate business need and granted based on the principle of least privilege for the minimum time required.
Defense-in-Depth
Security controls are implemented and layered according to the principle of defense-in-depth
Consistency
Security controls are applied consistently across all areas of the enterprise.
Continuous Improvement
The implementation of controls is iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.
We undergo audits and receive certification from leading third-party standards.
trust.cside.com
SOC 2
PCI DSS All customer data stored in our systems, including S3 buckets, is encrypted at rest. Sensitive tables and collections use row-level encryption, which means your data is protected even before it reaches the database. Physical or logical access alone isn't enough to read the most sensitive information.
Whenever data moves across potentially insecure networks, cside protects it using TLS 1.2 or higher. We also implement HSTS (HTTP Strict Transport Security) to add another layer of protection. TLS keys and certificates are securely managed by AWS and deployed through Application Load Balancers.
Encryption keys are handled through AWS KMS and stored in secure hardware modules (HSMs), inaccessible to both Amazon and cside staff. Keys are only used through KMS APIs for encryption and decryption. Application secrets are safely stored in AWS Secrets Manager and Parameter Store with strict access controls.
cside runs all large language models (LLMs) on our own private cloud, so your data is never exposed to third-party AI providers.
Air-Gapped AI Models
Our open source LLM models run in a completely isolated environment with no internet access, preventing any chance of accidental or unauthorized data leaks.
Self-Hosted on Private Cloud
All AI processing happens safely inside our own infrastructure. Unlike other services that send data to external AI providers through their API, your data never leaves our secure environment.
Open Source Transparency
We maintain full visibility and control over how our AI works by using open-source models. This means we can audit, verify, and ensure the security of our AI-powered features, no black-box solutions required.