
TRUST AND SECURITY
Your security is our top priority.
We adhere to comprehensive best practices and security principles to our platform to safeguard your data so that you can focus on what you do best: building high-stakes projects.
Data Encryption
All data is encrypted both in transit and at rest using industry-standard encryption protocols, namely, TLS1.2+ for data in transit and AES-256 for data at rest, ensuring that your data is secure at all times.
Data Ownership and Access Control
Your data is yours
All data submitted to ALICE, as well as any data generated through the use of that data, is owned by you.
Strict access control
Role-based access controls ensure users are granted only the minimum necessary permissions to perform their work.
Data residency
Choose where your data lives. Select your data region with ALICE to stay in control and support compliance goals.
Validated controls in place ensuring continuous testing, monitoring, and protection against evolving threats. Visit our trust center to get the latest report and learn more about our proactive controls.
- Annual third-party audits
- Accredited penetration testing
- Continuous internal audits and assessments, including an updated list of subprocessors
.png?width=960&height=540&name=Warehouse%20(1).png)

ALICE is SOC 2 Type II Compliant.
We maintain a well-documented incident response plan to detect, respond to, and contain security threats quickly and effectively. Read more in our policies here.
- Rapid detection and response
- Annual disaster recovery testing
- Minimal disruption

Ensuring you have uninterrupted access to your data.
- Regular backups
- Data stored in redundant locations
- Infrastructure is built for high availability

We proactively assess and enhance our practices with every update to ensure the platform remains secure and resilient.