Security and trust
CirclesCheck is built for compliance workflows where reliability, auditability, and data protection matter.
Encryption in transit
All traffic is served over TLS. Use API keys for server-to-server access.
Audit-friendly outputs
Structured responses, stored decisions, and alert workflows support review and evidence trails.
Access control
Role-based access control, API keys, and session-based authentication for dashboard users.
Rate limiting
Per-endpoint rate limits help protect availability and reduce abuse.
Webhook signatures
Webhooks can be signed with HMAC-SHA256 so your systems can verify authenticity.
Roadmap
If you need specific attestations (SOC 2, ISO 27001) or data residency, tell us your requirements and we will prioritize accordingly.
Need a security review?
We can share details relevant to your vendor risk questionnaire and implementation plan.
Request security details
Tell us what framework or questionnaire you use.