Pyract Forge

Trust & security

How we protect your data.

A plain-language summary of the controls in place today, the integrations we federate to, and where we're heading on formal compliance.

Last updated: · Questions? security@pyract.com

Where Pyract Forge stands today

Forge is in pre-pilot stage. The architecture and controls described below are implemented in code; formal third-party attestations (SOC 2, ISO 27001) are on the roadmap and will be pursued in conjunction with our first paying customer. We're transparent about what's done versus planned.

Authentication & identity

Encryption

Hosting & data residency

Data handling

Subprocessors

We use a small number of trusted subprocessors. The full current list is provided to customers under NDA on request. Notable categories:

Customers receive 30 days' notice of any subprocessor change.

Backups & recovery

Incident response

If we identify a security incident affecting customer data, we will notify the affected customer's designated security contact within 72 hours of confirmation, in line with PIPEDA and GDPR notification timelines. Notifications include the nature of the incident, data involved, mitigation taken, and ongoing remediation steps.

Report a suspected vulnerability or incident at security@pyract.com. We respond to good-faith disclosures within two business days.

Compliance roadmap

Customer-controlled options

Procurement & vendor questionnaires

For SIG Lite, CAIQ, or vendor security questionnaires, please contact security@pyract.com. Standard turnaround for completed questionnaires is five business days. We can also share our subprocessor list, recent backup-restore test results, and architecture overview under NDA.