Security & data posture · v1.0 Last updated 2026-05-07
security · data sovereignty · honest posture

The architecture is the security story.

A factual document for security and procurement teams. We say what we do today, what's available on Scale by agreement, and what's still being built. We do not claim certifications we don't hold or controls we haven't tested. Send questions to security@leedab.com.

Core principle

Customers own their workspace data. We licence the agents that operate inside it.

The "brain" we build with you — every note, decision, conversation, customer record — is your asset. You can export it, fork it, take it elsewhere. The agents that read and write to it are our software, licensed for the duration of the agreement.

This isn't marketing. It's the architecture choice we made first, and it's the reason a lot of what follows is simpler than at companies that route every byte of customer data through their own SaaS-shaped pipes.

Honest posture LeedAB is an early-stage company. We are not yet SOC 2 certified. We do not hold HIPAA, PCI, or FedRAMP attestations. This document describes the controls actually in place today, what's available on Scale by contract, and what's planned. If your procurement process requires certifications we don't hold, talk to us about Private Deployment — but we won't pretend to a maturity we haven't built.
01

Workspace ownership and portability

02

Data flow — exactly what crosses what boundary

A request from your team flows through three components. Here's what happens at each boundary:

[ Your team ] | | request via Telegram / web console (TLS 1.3) v [ LeedAB orchestrator ] <-- runs in storage region you select on Growth+ | | reads/writes your workspace (encrypted at rest) | | forwards prompt + task-relevant workspace context v [ LLM provider — Anthropic primary, OpenAI for specific tools ] | | returns response v [ LeedAB orchestrator ] | | appends action to audit log + (optionally) updates workspace v [ Your team ]

What is sent to the LLM provider per request: the user's prompt + the task-relevant context drawn from the workspace. We do not intentionally send the entire workspace upstream for a single request.

Important honesty point: LLM inference, CDN, observability, and payment subprocessors may process data in regions other than your selected workspace storage region. Those regions are listed in section 09. "Region of choice" applies to LeedAB application storage; provider-side inference is governed by your chosen LLM provider's regions and policies.

03

LLM providers and training use

ProviderUseTraining opt-outProvider retention (default)
Anthropic (Claude) Primary — agent reasoning API default opts out of training Up to 30 days for abuse monitoring; ZDR available under specific contractual arrangements
OpenAI Specific tools — transcription (Whisper), embeddings API default opts out of training Up to 30 days for abuse monitoring; ZDR available for qualified customers
Local (Private Deployment) Open-weights model on your infrastructure N/A — no external provider Zero external retention

Provider retention and training-use are governed by LeedAB's contracted provider settings and the specific API features used. LeedAB does not permit customer content to be used for model training where provider controls or contracts allow us to prevent it. ZDR (Zero Data Retention) is implementable for Scale and Private Deployment customers under contractual arrangement; we will not claim ZDR is active on your account unless your specific contract specifies it.

04

Access controls

For your team

Role-based access per workspace: who can read, write, or operate agents.

SSO (SAML 2.0 / OIDC): available on Scale tier.

MFA: required for admin operations on Growth and above.

Session lifetime: configurable; default 30 days idle, admin-revocable any time.

For LeedAB staff

No routine access to customer workspaces. Staff do not log in to your workspace as part of normal operations.

Production access is restricted to a small named set of personnel, requires a documented business justification (typically your support request), and is logged.

Logged actions are reviewable on Growth and above as part of the customer audit log. We are explicit when we access; we do not silently inspect.

05

Data residency — application storage

Region selections below apply to LeedAB application storage: where your workspace lives at rest. They do not govern LLM inference (handled by provider per section 03) or other subprocessors (section 09).

06

Encryption

07

Retention, deletion, audit

08

Backups and durability

We're explicit about what's in place today vs available by contract. We don't promise enterprise-grade RPO/RTO numbers we haven't validated with restore drills.

In place today
  • Daily full backup, retained 30 days
  • Backup integrity checks daily
  • Manual restore tested in-session
  • Same-region durable storage (S3 11-9s)
Available on Scale
  • Hourly incremental + daily full
  • Cross-region replication (within legal jurisdiction)
  • Documented RPO + RTO targets agreed in contract
  • Quarterly restore drill, results shared under NDA
Planned
  • SOC 2 Type 1 control inventory complete
  • Automated DR runbook + on-call rotation
  • Independent backup integrity verification
09

Subprocessors

Full current list. We notify in advance of changes; you may object.

SubprocessorPurposeRegionData accessed
AnthropicPrimary LLM inferenceUSPer-request prompt + task-relevant context
OpenAITranscription, embeddings (specific tools)USPer-request audio/text
AWSCompute, storage, networkingCustomer-selected on Growth+Workspace content (encrypted at rest)
CloudflareCDN, DDoS protection, edge routingGlobalRequest metadata only
StripeSubscription billingUS / AUBilling details only — no workspace access
SentryError monitoringEUStack traces, scrubbed of PII
10

Compliance posture

We're early. We'd rather be honest about that than overstate.

In place today
  • Encrypted transports (TLS 1.3) + at-rest (AES-256)
  • Least-privilege access controls + audit logging
  • MFA on admin operations
  • Operating consistent with GDPR · CCPA · APP (Australia)
  • DPA available on request (Growth+)
Available on Scale
  • Customer-managed keys (CMK)
  • Dedicated infrastructure
  • Customer-readable audit log
  • Bespoke contract terms (MSA + DPA redlines)
Roadmap (no certifications claimed today)
  • SOC 2 Type 1 — control inventory + auditor selection in progress
  • SOC 2 Type 2 — follows Type 1
  • Vendor security review documentation pack

Not certified: HIPAA, PCI-DSS, FedRAMP, ISO 27001. If your industry requires these, talk to us about Private Deployment where compliance shifts to your infrastructure — we will not claim certifications we don't hold.

11

Incident response

12

Who to contact

Security questions · whitepaper requests

security@leedab.com

Response SLA: 1 business day for procurement-stage queries. Vendor security questionnaires returned within 5 business days.

DPA · MSA · custom contract terms

legal@leedab.com

Standard documents available on request; bespoke redlines on Scale tier.

Send a security question Save as PDF ← Back to pricing