Trust & Security
How Aevrum protects your data
Aevrum is an operational intelligence platform run by Black Line Ops. Your uploaded business data feeds dashboards, AI assistants, and recommendations — and the way we handle that data is treated as a first-class engineering concern. This page is the short, public summary of how we do that. For customer-specific commitments, see our Privacy Policy and DPA.
Encryption everywhere
TLS 1.2+ in transit. At rest, every byte sits on encrypted Supabase Postgres (AES-256). Sensitive identity fields are additionally encrypted with per-organization keys at the application layer (Phase 15).
Row-level security on every table
Every Postgres table enforces RLS at the database level. A query from one organization physically cannot reach another organization's data — even via a tampered client or a misconfigured server action. Verified by 285+ automated tests.
US-only infrastructure
Supabase Postgres + storage hosted in us-east-1 (AWS). Vercel edge serves the app from US regions. No data leaves the United States in normal operation.
Strict role model
Owner / Admin / Analyst / Viewer roles inside each organization. A separate Platform Admin role (granted via direct SQL, not a UI) is required for any cross-org operation. Every privileged action is audit-logged.
Prompt-injection defenses for AI
Kirk and the custom-widget generator (Claude API) receive your data inside untrusted-data delimiters. User-typed values are sanitized before interpolation — payloads like ‘ignore previous instructions’ are neutralized before the model sees them. The system prompt explicitly instructs Claude to treat delimited content as data only.
Full audit trail
Every login, upload, role change, AI call, share-link creation, scheduled report run, and recommendation update is recorded in audit_logs with actor, IP, and timestamp. Admins can review the full log under /app/audit; platform admins can review across orgs.
AI usage & provider choice
Aevrum’s AI features (Kirk, custom widget generation, recommendation summaries) route through Anthropic’s Claude API. Anthropic does not train on customer API traffic. When AI is disabled (the deterministic mock mode), no data leaves Aevrum’s servers.
- • Per-user + per-organization daily rate limits prevent runaway cost or abuse
- • Every AI call is logged with provider, prompt size, status, and (where applicable) the tool invoked
- • PII redaction passes strip obvious identifiers from prompts before send
- • Mock mode runs identically to real AI for development and offline demos
Compliance & certifications
SOC 2 Type I
In progressReadiness assessment underway. Estimated completion Q3 2026.
GDPR / UK GDPR
ReadyDSR endpoints + DPA template available. EU-based customers can request EU residency on request.
HIPAA / PHI
Not supportedAevrum is not currently a Covered Entity or BAA-eligible. Do not upload PHI.
Subprocessors
These third parties process customer data on Aevrum’s behalf. We notify customers in advance of any addition or change.
- SupabasePostgres database, authentication, file storageus-east-1 (AWS)
- VercelApplication hosting, edge network, build pipelineUnited States
- AnthropicClaude API for Kirk + custom widget generationUnited States
- ResendTransactional email (invites, alerts, weekly digest)United States
Report a security issue
We take security reports seriously. Please email security@blacklineops.ai with details of any suspected vulnerability. We’ll acknowledge within 48 hours and work with you in good faith — no legal action against researchers who follow this disclosure path.
Last updated 2026-05-23 · Aevrum is an active-development product; this page evolves alongside the controls it describes.