
Security
Built for financial data
Synchronized handles sensitive financial documents and structured client data. Security is not a feature — it is the architecture.

Encryption
All data is encrypted at every stage — in transit, at rest, and in storage. Keys are managed via AWS KMS with automatic rotation.
TLS 1.3 on all API traffic, uploads, and inter-service calls
AES-256 for documents, extracted fields, and graph data
Isolated S3 with server-side encryption and presigned URLs
TLS 1.3 · ECDHE-RSA-AES256-GCM-SHA384
Certificate: *.synchronized.co
HSTS: max-age=63072000; includeSubDomains
AES-256 · AWS KMS key rotation
Backup: continuous + point-in-time recovery
Access: presigned URL · 15min expiry

| Role | Read | Write | Approve | Admin |
|---|---|---|---|---|
| Firm Admin | ✓ | ✓ | ✓ | ✓ |
| Advisor | ✓ | ✓ | ✓ | — |
| Analyst | ✓ | ✓ | — | — |
| Compliance | ✓ | — | ✓ | — |
| Operations | ✓ | ✓ | — | — |
| Client | ✓ | — | — | — |
Enforced at API layer via Pundit policies. All queries auto-scoped to firm.
Access Control
Every data model is scoped to a firm. JWT tokens carry firm context, and all queries are automatically filtered. Six granular roles control exactly who can read, write, approve, and administrate.
Zero cross-tenant access by design — firm_id enforced at every layer
24hr JWT expiry, JTI revocation, automatic idle timeout

Audit & Provenance
Every piece of data in Synchronized maintains a chain of custody — from the original document to the final verified value.
tax_return_2024.pdf · page 1, line 9
Gross Income → $285,000 · confidence: 0.97
Draft record #4821 · 142 fields
J. Smith approved · 141 accepted, 1 corrected
Smith Household model updated · v12

Infrastructure
AWS with Railway orchestration. Continuous backups with point-in-time recovery.
Private inter-service communication. Only GraphQL API and upload paths are public.
Automated vulnerability scanning. Verified base images. Zero secrets in source.
Compliance
Audit in progress. Designed from ground up for Trust Services Criteria: security, availability, confidentiality.
Configurable per firm. Soft-delete architecture — recoverable during retention, permanently purged after.
All processing within AWS US regions. Region-specific deployment for enterprise.

AI & Document Processing
AI proposes. Humans approve. No extracted data is treated as truth until an authorized user reviews and verifies it. The system never makes autonomous decisions about financial data.
Human-in-the-loop
Every extraction is a proposal. Advisors see confidence scores, review each field, and explicitly approve before anything enters the system of record.
Model isolation
Client data is never used to train or fine-tune models. Document processing is stateless — no client data persists in the AI pipeline after processing completes.
Confidence scoring
Every field includes a numerical confidence score. Low-confidence extractions are flagged automatically. You always know what needs your attention.

Questions about security?
We are happy to discuss our security practices, provide documentation for your compliance team, or schedule a technical walkthrough of our architecture.
Contact security team