Skip to main content

Security, Privacy, and Data Handling

How we handle customer data

Updated over 2 weeks ago

Overview

Penetration testing platforms operate in uniquely sensitive environments. By design, they interact with security controls, infrastructure, and systems that organizations are actively trying to protect. That reality places a higher burden on how such platforms handle data, enforce access controls, and design testing behavior.

RedVeil is built with this responsibility in mind. Security and privacy considerations are not treated as an afterthought or a compliance checkbox, but as foundational requirements that shape how the platform operates.

This article provides a detailed, high-level overview of how RedVeil approaches security, privacy, and data protection, and how those practices align with common security and privacy frameworks.

Data Collection and Purpose Limitation

RedVeil collects data strictly for the purpose of performing penetration testing and delivering usable results to customers.

This includes information such as target scope details, configuration inputs required to execute tests, test execution metadata, and the findings and artifacts generated during testing. Each category of data collected serves a specific operational purpose tied directly to testing, reporting, or customer visibility.

RedVeil follows a purpose limitation model. Data is not collected speculatively, reused for unrelated purposes, or retained simply because it may be useful later. We also do not train our AI on usage data. This principle helps ensure that data handling remains predictable, defensible, and aligned with modern privacy expectations.

Data Minimization and Exclusions

Data minimization is a core design principle within RedVeil.

The platform is intentionally not designed to ingest or store customer production data beyond what is necessary to perform testing. RedVeil does not collect application source code, unrelated business data, or arbitrary system information outside the defined scope of a test.

When authentication material or credentials are provided, they are used only for the purpose of enabling deeper testing and are handled in accordance with access and retention controls. RedVeil avoids retaining sensitive material longer than necessary and limits exposure wherever possible.

By minimizing what is collected and retained, RedVeil reduces risk, limits blast radius, and aligns with privacy-by-design principles common across modern regulatory and security frameworks.

Data Retention and Lifecycle Management

Data within RedVeil follows a defined lifecycle tied to customer use and operational need.

Test results, findings, and reports are retained to support customer access, historical analysis, and audit or compliance workflows. Retention exists to provide value to customers, not to accumulate data indefinitely.

Customers maintain control over their testing data within the platform, including visibility into past tests and reports. Retention practices are designed to balance usability with minimization, and retention periods may evolve as the platform matures and customer needs change.

RedVeil does not retain data without purpose, and retention decisions are informed by operational necessity, security considerations, and privacy best practices.

Access Controls and Authorization

Access to customer data within RedVeil is tightly controlled and intentionally limited.

The platform enforces role-based access controls that determine what users can see and do within an account. Administrative users manage access for additional users, allowing organizations to align platform access with internal roles and responsibilities. Multi-factor authentication is available and can be enforced by administrative users. Session logging and account access logs are also available for tracking purposes.

Internally, access to customer data is restricted to authorized personnel and only when required for legitimate operational purposes such as support or platform maintenance. Internal access is governed by policy, logged, and reviewed to ensure accountability.

This layered access control model helps prevent unauthorized access while supporting collaboration and operational needs.

Security Controls and Data Protection

RedVeil applies industry-standard security controls to protect customer data throughout its lifecycle.

Data is protected in transit and at rest using encryption where appropriate, and platform security controls are informed by established best practices. These controls are not static; they are reviewed and improved as the platform evolves and as new risks are identified.

Testing behavior itself is also designed with security in mind. Actions are rate-limited and modeled after realistic human behavior rather than aggressive or destructive automation. This approach helps reduce unnecessary strain on customer systems while still enabling meaningful assessments.

While no penetration testing can be guaranteed to be risk-free, RedVeil applies safeguards informed by real-world penetration testing experience to reduce unnecessary exposure.

Privacy and Regulatory Alignment

RedVeil is designed to be suitable for organizations operating under a wide range of security and privacy frameworks.

While RedVeil does not claim certification under any specific framework, its data handling practices and testing methodology are commonly used to support compliance efforts aligned with frameworks such as:

  • SOC 2

  • ISO/IEC 27001

  • HIPAA

  • GDPR

  • ISO/IEC 42001

  • NIST AI Risk Management Framework

Across these frameworks, common themes emerge: data minimization, access control, auditability, transparency, and risk management. RedVeil’s approach emphasizes these principles rather than narrowly optimizing for any single standard.

This allows customers to integrate RedVeil into broader compliance and governance programs without introducing misalignment or unnecessary risk.

Transparency and Customer Control

Transparency is a deliberate design choice within RedVeil.

Customers retain visibility into what testing is performed, what data is generated, and what results are produced. Testing behavior, scope, and outputs are not abstracted away in a way that prevents understanding or review.

Testing activity is tracked for every action the AI performs and is visible to each user associated with a customer account. These activity logs indicate all actions taken along with time stamps.

Reports and findings are structured to be shareable with internal teams, auditors, and external stakeholders. Customers are not required to rely on opaque summaries or black-box assertions to understand their security posture.

If questions arise around data handling, scope, or security controls, RedVeil encourages direct communication to ensure expectations are aligned and concerns are addressed.

Summary

RedVeil approaches security, privacy, and data protection with the understanding that trust is foundational to effective penetration testing.

By emphasizing data minimization, enforcing access controls, protecting data throughout its lifecycle, and aligning with established security and privacy principles, RedVeil enables powerful testing without unnecessary exposure.

These practices allow organizations to integrate RedVeil into their security programs with confidence, clarity, and control.

Did this answer your question?