LinkedIn Tag
Security

Security and Privacy at cside

Security and privacy run in our veins. Our unique approach to securing 3rd party scripts, combining cutting-edge technology with AI expertise, sets us apart in protecting B2B SaaS, eCommerce, and websites utilizing third-party scripts.

Governance

At cside, we prioritize the security and privacy of our users. We are committed to protecting your personal information and ensuring a safe environment for all our services.

Each cside employee is tasked with maintaining compliance with applicable frameworks. We hold each other accountable and use tools to continuously monitor and audit our actions and systems.

Security governance illustration

Our policies are based on the following foundational principles:

Least Privilege Access

Access is limited to those with a legitimate business need and granted based on the principle of least privilege for the minimum time required.

Defense-in-Depth

Security controls are implemented and layered according to the principle of defense-in-depth

Consistency

Security controls are applied consistently across all areas of the enterprise.

Continuous Improvement

The implementation of controls is iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.

Compliance and Certifications

We undergo audits and receive certification from leading third-party standards.

trust.cside.com
GDPR
SOC 2 certification logo SOC 2
PCI DSS certification logo PCI DSS
Data Protection
Data at Rest

All customer data stored in our systems, including S3 buckets, is encrypted at rest. Sensitive tables and collections use row-level encryption, which means your data is protected even before it reaches the database. Physical or logical access alone isn't enough to read the most sensitive information.

Data in Transit

Whenever data moves across potentially insecure networks, cside protects it using TLS 1.2 or higher. We also implement HSTS (HTTP Strict Transport Security) to add another layer of protection. TLS keys and certificates are securely managed by AWS and deployed through Application Load Balancers.

Secret Management

Encryption keys are handled through AWS KMS and stored in secure hardware modules (HSMs), inaccessible to both Amazon and cside staff. Keys are only used through KMS APIs for encryption and decryption. Application secrets are safely stored in AWS Secrets Manager and Parameter Store with strict access controls.

Open Source AI and Zero Data Leakage

cside runs all large language models (LLMs) on our own private cloud, so your data is never exposed to third-party AI providers.

Air-Gapped AI Models

Our open source LLM models run in a completely isolated environment with no internet access, preventing any chance of accidental or unauthorized data leaks.

Self-Hosted on Private Cloud

All AI processing happens safely inside our own infrastructure. Unlike other services that send data to external AI providers through their API, your data never leaves our secure environment.

Open Source Transparency

We maintain full visibility and control over how our AI works by using open-source models. This means we can audit, verify, and ensure the security of our AI-powered features, no black-box solutions required.

Why Leading QSAs Prefer cside

ONLY CSIDE DELIVERS
A PCI-specific dashboard to easily report on 6.4.3 & 11.6.1
Real-time payload inspection before it hits the browser
DOM-level, time-based, and dynamic threat detection