✓ COMPLIANT · SOC 2 TYPE II · GLBA SAFEGUARDS RULE · ISO 27001

Built on the same security stack we run for Fortune 500 banks.

Bravo handles tax returns, bank statements, and personal financial statements — the most sensitive data in consumer finance. Bot2Do's security posture is engineered for exactly this workload. Encryption, MFA, role-based access, audit logging, pen testing and privacy controls — not bolted on, built in.

SOC 2 Type II
AUDITED 2026
GLBA
SAFEGUARDS
ISO 27001
ALIGNED
CCPA
READY
NIST CSF
MAPPED
FinCEN
KYC / AML
98
/100

Security posture · Enterprise Grade A+

Independent audit score from Prescient Assurance (April 2026). Zero critical findings. 2 low-severity observations remediated within 14 days. Next audit: October 2026.

Core controls — GLBA Safeguards Rule (2023 update)

All in compliance
Encryption at rest & in transit
AES-256 for all customer data storage; TLS 1.3 for every API call and page view.
GLBA §314.4(c)(3)
ENFORCED
Multi-factor authentication
TOTP/Passkeys required for all Bravo staff + all borrower accounts accessing NPI.
GLBA §314.4(c)(5)
ENFORCED
Role-based access control (RBAC)
Least-privilege across 9 defined roles. Field-level masking on PFS, tax returns, SSNs.
GLBA §314.4(c)(1)
ENFORCED
Immutable audit logging
Every data access, mutation, export, or model prediction cryptographically logged & tamper-evident.
GLBA §314.4(c)(6)
ENFORCED
Annual penetration testing
External red-team engagement (Bishop Fox) · last test March 2026 · zero critical findings.
GLBA §314.4(d)(2)
CURRENT
Biannual vulnerability assessment
Automated scans daily · manual review semi-annually · remediation SLA: critical 24h / high 7d.
GLBA §314.4(d)(2)
UP-TO-DATE
Written information security program
Comprehensive WISP, board-approved, reviewed quarterly, aligned to NIST CSF 2.0.
GLBA §314.3
DOCUMENTED
Incident response program
24/7 SOC monitoring · 15-min Sev-1 paging · 72-hr regulatory notification protocol ready.
GLBA §314.4(h)
OPERATIONAL
Vendor / third-party oversight
All sub-processors SOC 2-attested (AWS, OpenAI, Anthropic, Plaid, DocuSign, Twilio…).
GLBA §314.4(f)
ALIGNED
Secure disposal of data
Cryptographic erasure on account closure. Right-to-delete honored within 30 days.
GLBA §314.4(c)(4)
ENFORCED

Encryption status · live

100%
Borrower tax returns (1120, K-1, 1040)
AT REST · 1,248 files · encrypted
AES-256-GCM ACTIVE
Bank statement PDFs
AT REST · 842 files · per-tenant key
AES-256-GCM ACTIVE
Personal financial statements
AT REST · 312 files · field-masked
AES-256-GCM ACTIVE
API traffic (all endpoints)
IN TRANSIT · 2.4M req / day
TLS 1.3 ACTIVE
Database (Postgres)
AT REST · KMS-managed keys
AES-256 ACTIVE
Secrets & credentials
AWS Secrets Manager · rotated 90d
KMS envelope ACTIVE
Backups (cross-region)
AT REST · S3 · object lock (WORM)
AES-256 ACTIVE

Role-based access · Bravo tenant

9 roles
RoleView PFSView SSNOverride UWExportAdmin
Raymond (Principal)
Tom (Sr. Advisor) masked
Junior Advisor masked limited
Loan Processor masked
Borrower own only own only
Bot2Do support break-glass

Borrower data flow — where the protections kick in

Portal intake

TLS 1.3
Borrower uploads via HTTPS · client-side validation · no cookies leak

Ingress

WAF + DDoS
Cloudflare WAF · OWASP Top 10 rules · rate limiting · bot management

AI processing

VPC · no model training
Models run in private VPC · no customer data sent to public model training

Storage

AES-256 + KMS
Per-tenant keys in AWS KMS · field-level encryption on SSN, TIN, account #s

Retrieval

RBAC + audit
Every read checked against role · logged · PII auto-masked based on viewer role

Live security event stream

24/7 SOC
10:42:18
Scheduled vulnerability scan complete · 0 critical · 0 high · 2 info
scanner.bot · Qualys VMDR
10:38:41
Tom Clarke signed in · MFA verified (Passkey) · location: Naperville, IL (known)
auth.log · IP 73.247.xxx.48 · Chrome 125
10:36:02
Blocked: credential-stuffing attempt on borrower portal (42 failures from known bad IP).
WAF · auto-blocked · Cloudflare rule RL-0012
10:30:18
Secrets rotation · borrower-svc DB credentials rotated · 0 downtime
secret-rotator.bot · AWS Secrets Mgr
10:24:07
Underwriting file exported for Deal #BR-2419 by Tom Clarke. Event immutably logged.
audit.log · hash 0x3c9e…78a2
10:18:54
Anomaly: borrower james.wilson downloaded own file from new device. MFA re-verified, user confirmed.
anomaly.bot · device-fingerprint
10:14:03
OFAC / sanctions screening complete for Deal #BR-2419 · all 3 beneficial owners clear
compliance.bot · OFAC SDN list · refreshed daily
10:02:38
Backup snapshot complete · cross-region replication verified · object-lock engaged
backup.bot · S3 us-east-1 → us-west-2
09:57:22
Health check · all 14 core services healthy · SLA 99.998% month-to-date
uptime.bot · Datadog synthetics
Last pen test
0 critical
Mar 2026 · Bishop Fox · report on file
Uptime SLA (30d)
99.998%
target 99.99% · 1 min under in 30d
Threats blocked (30d)
84,217
Cloudflare + internal WAF
Data breaches · lifetime
Zero
across all Bot2Do clients (2019-26)