Connecting your AWS account to a third-party service requires real trust. Here is the current trust model in plain English: what the Core Scan Role can access, what optional roles unlock, what gets stored, and how the product is reviewed.
Core customer data stays in managed, encrypted services.
Primary database for all structured scan data.
Managed infrastructure used to run the app and store generated report artifacts when needed.
The Core Scan Role stays narrow. More sensitive data sources are separate opt-in capabilities.
New accounts start with the Core Scan Role instead of one broad role up front.
Your data is protected at every layer.
Row-Level Security is enforced at the database level — not just in application code.
Every database query is automatically filtered by your customer_id. This is enforced at the PostgreSQL level — meaning even if there were a bug in our application code, the database itself would prevent your data from being returned to another customer's session.
How OpsCurb supports procurement, legal, and security review.
OpsCurb formal certifications
Not claimed
OpsCurb does not currently claim formal compliance certifications.
Payment security
Processor-managed
Payments are handled by DodoPayments; OpsCurb does not store card details.
Privacy requests
Supported
Data access/export/deletion requests are handled via support@opscurb.com.
Data residency
US-East default
Enterprise requests for custom residency may be available.
| Area | Status | Details |
|---|---|---|
| OpsCurb formal certifications | Not claimed | OpsCurb does not currently claim formal compliance certifications. |
| Payment security | Processor-managed | Payments are handled by DodoPayments; OpsCurb does not store card details. |
| Privacy requests | Supported | Data access/export/deletion requests are handled via support@opscurb.com. |
| Data residency | US-East default | Enterprise requests for custom residency may be available. |
The same access manifest drives the onboarding wizard, generated policy files, and published permissions matrix.
Permission-to-feature mapping, required vs optional roles, and stored vs transient handling.
What is collected, what is not collected, retention windows, deletion behavior, and subprocessors.
How OpsCurb treats AI-assisted development, human review, and security-sensitive changes.
Questions? Contact us at security@opscurb.com. Full details in our Security Policy and Data Handling documentation, plus the public Permissions Matrix and AI Assurance documentation.