← Back to home

Security

Last reviewed 25 April 2026. This page summarises how SetupPasskeys protects customer data, the controls in place around the platform, how to report vulnerabilities, and what is on our compliance roadmap. For a vendor-assessment questionnaire or signed security pack suitable for an enterprise procurement review, email security@setuppasskeys.com.

Hosting
EU/EEA only
Vercel (Frankfurt) + Supabase (Frankfurt)
Encryption
TLS 1.2+ in transit · AES-256 at rest
HSTS preloaded · CSP-locked frames
DPA
GDPR-aligned · UK GDPR + EU SCCs
Compliance roadmap
SOC 2 Type II in 2026
ISO 27001 evaluation Q4 2026
What we store
  • Org name, logo URL, accent colour, passkey policy
  • Admin email + Supabase Auth session
  • Anonymised usage events (vendor, step, outcome)
  • Stripe customer ID + subscription ID (no card data)
What we never store
  • Passkey secrets — they live on the user's device
  • End-user PII — names, phones, employee IDs
  • Card numbers or payment methods (handled by Stripe)
  • End-user passwords or Microsoft tokens of any kind
Subprocessors at a glance
SubprocessorPurposeRegion
VercelEdge hosting, serverless functionsEU (Frankfurt)
SupabasePostgres database, auth, row-level securityEU (Frankfurt)
StripeBilling + payment processingEU / US (Stripe data residency)
ResendTransactional email deliveryEU / US
Google GeminiOptional AI diagnose feature (opt-in)EU / US

1. What we protect

SetupPasskeys is a guided passkey-registration product for Microsoft Entra ID. The data we hold is intentionally minimal:

We do not store, see, or proxy passkey credentials. Passkey secrets remain on the end user's device and in Microsoft Entra ID — SetupPasskeys is the guidance layer, not the identity provider.

2. Hosting and infrastructure

All sub-processors are listed in the privacy policy with their data-residency and transfer mechanisms. We will give existing customers at least 30 days notice before adding a new sub-processor that handles personal data.

3. Encryption

4. Access controls

5. Browser-side hardening

The static landing site, the admin portal, and the super-admin dashboard each run under a tailored Content Security Policy defined in vercel.json:

6. Application-level controls

7. Monitoring and incident response

8. Vulnerability disclosure

If you believe you have found a security vulnerability in SetupPasskeys, please email security@setuppasskeys.com with a description, reproduction steps, and any proof-of-concept material. We aim to acknowledge within one working day and to resolve confirmed issues within 30 days, sooner for high-severity reports.

Please do not test against live customer data, do not access information that does not belong to you, and do not perform denial-of-service or social-engineering attacks. We will not pursue good-faith research that follows these rules.

9. Compliance roadmap

Customers needing a fully-reviewed security pack, a vendor-assessment response, or a signed DPA before pilot can request one through security@setuppasskeys.com.

10. Contact

General security questions, vulnerability reports, and compliance requests: security@setuppasskeys.com. For data privacy questions, see the privacy policy.


See also the Privacy Policy, Terms of Service, and Data Processing Addendum.