Security
Rastro is operated with an enterprise-grade security posture for catalog operations workflows. We do not claim SOC 2 today, but we design the product, infrastructure, and operating practices for security-conscious teams that expect careful controls, clear ownership, and conservative handling of customer data.
Security posture
Security is treated as an operating requirement, not a marketing layer. We design for least-privilege access, careful separation of environments, controlled production changes, and auditable operational workflows. The system is built for business use by distributors and manufacturers handling sensitive commercial product data.
Infrastructure and providers
Our current stack combines AWS-hosted backend infrastructure with specialized providers for authentication, workflow orchestration, observability, communications, and site delivery. The provider footprint is kept intentionally focused rather than spread across many overlapping systems.
Data handling and access control
We aim to minimize unnecessary exposure of customer information and keep permissions narrow by default. Data access is limited to what is required to operate the service, support customers, maintain reliability, and investigate issues or misuse.
Monitoring, resilience, and incident handling
Reliability and security operations are coupled. We use centralized logging, infrastructure monitoring, durable workflow execution, and controlled deployment paths so issues can be detected, triaged, and remediated quickly.
Certifications and current claims
We do not currently claim SOC 2 certification on this page. We prefer to state only what we can stand behind directly: a cautious, enterprise-grade security posture, a tightly managed provider stack, and conservative handling of customer data. If your procurement process requires specific documentation, we can handle that directly over email.
