Data Security

Enterprise-grade security, compliance, and infrastructure designed to protect your data and ensure trust at every layer of the platform.

Overview

Exterview AI is built on Microsoft Azure with a security-first architecture designed for enterprise hiring workflows. This page describes the security controls, certifications, and practices that protect customer and candidate data across the platform.

Certifications and Compliance

Certification Status Scope
SOC 2 Type II Certified Security, Availability, Confidentiality, Privacy
ISO 27001 Certified Information Security Management System
ISO 42001 Certified AI Management System
DPDP 2023 (India) Compliant Digital Personal Data Protection
GDPR Aligned EU Data Protection
EU AI Act In Progress Risk-based AI Regulation
NIST AI RMF In Progress AI Risk Management Framework
HIPAA In Progress Healthcare Data Protection

Infrastructure Security

Cloud Platform

Provider: Microsoft Azure (Enterprise)

Architecture: Fully serverless Azure Functions v4, Cosmos DB, Azure Blob Storage

No VMs: Immutable deployments with no persistent virtual machines

Region: Configurable Azure region per customer requirement

Program: Microsoft for Startups Pegasus program participant

Network Security

Zero Trust Architecture: No public endpoints for backend services

API Management: All external traffic routed through Azure API Management (APIM)

WAF: Web Application Firewall protects all public-facing endpoints

DDoS Protection: Azure DDoS Protection Standard enabled

Private Networking: Production access restricted to essential personnel with time-limited elevated access via Azure PIM

Identity and Access Management

SSO: Microsoft Entra ID (Azure AD) with SAML 2.0 and OIDC

MFA: Multi-factor authentication enforced for all platform access

RBAC: Role-based access control with configurable permission levels

Least Privilege: Production access restricted to essential personnel with time-limited elevated access via Azure PIM

Data Security

Cloud Platform

At Rest: AES-256 encryption for all data stored in Cosmos DB and Azure Blob Storage

In Transit: TLS 1.3 for all data transmitted between clients, APIs, and internal services

Key Management: Azure Key Vault for all secrets, API keys, and encryption keys — no hardcoded credentials

Tenant Isolation

Partition Key: Every Cosmos DB container uses /tenantId as the partition key (ADR-002)

Logical Isolation: Customer data is logically separated at the database level, no cross-tenant data access is possible

Query Enforcement: All database queries include tenant context, queries without tenantId are rejected

Data Residency

Default: US Azure regions

Configurable: Customers may request data residency in specific Azure regions (EU, India, APAC)

Sub-processor Transparency: Full sub-processor list available in our Data Processing Agreement

Data Retention and Deletion

Active Data: Retained for the duration of the customer subscription

Post-Termination: Customer data available for export for 30 days, then permanently deleted

Backup Purge: Backup copies purged within 90 days of primary deletion

Candidate Data: Retention period configurable per customer policy

Application Security

Secure Development Lifecycle (SDLC)

Code Review: All code changes require peer review before merge

Static Analysis: Automated security scanning in CI/CD pipeline

Dependency Scanning: Regular scans for known vulnerabilities (CVEs) in dependencies

Secret Detection: Automated checks prevent credentials from entering source code

Threat Modeling: Conducted for all new features and agent architectures

AI Security

Schema-Pinned Outputs: All AI-generated outputs are validated against predefined schemas before storage (ADR-006)

Prompt Security: Prompt injection protections and input validation on all agent interactions

Model Governance: AI models deployed through Azure OpenAI Service with enterprise data boundaries

Explainability: Every AI output includes reasoning chains and evidence for auditability

Bias Monitoring: Configurable bias detection thresholds with automated alerts

Fraud Prevention

Liveness Detection: Real-time verification during video interviews

Deepfake Analysis: AI-powered detection of synthetic media

Proctoring: Live monitoring during panel and assessment sessions

Immutable Audit Logs: All interview sessions produce tamper-proof records

Operational Security

Monitoring and Incident Response

SIEM: Azure Sentinel for security event monitoring and correlation

Logging: Centralized logging with Azure Application Insights

Alerting: Real-time alerts for anomalous access patterns and security events

Incident Response: Documented IR procedures with defined escalation paths and SLAs

Post-Incident: Root cause analysis and remediation tracking for all security incidents

Business Continuity

Availability Target: 99.9% uptime SLA for Enterprise customers

Geo-Redundancy: Data replicated across Azure availability zones

Disaster Recovery: Automated failover with RPO < 1 hour and RTO < 4 hours

Backup: Every AI output includes reasoning chains and evidence for auditability

Bias Monitoring: Daily automated backups with point-in-time recovery capability

Endpoint Security

EDR: Microsoft Defender for Endpoint on all employee devices

MDM: Mobile Device Management enforcing encryption, screen lock, and remote wipe

Background Checks: Required for all employees with access to production data

Third-Party Security

Sub-Processors

All sub-processors are required to maintain security certifications equivalent to or exceeding Exterview's standards.

Sub-Processor Service Security Standard
Microsoft Azure Cloud Infrastructure SOC 2, ISO 27001, FedRAMP
Azure OpenAI Service AI Model Inference SOC 2, ISO 27001
Merge.dev ATS/HRMS Integration SOC 2 Type II
Langfuse Prompt Observability GDPR Compliant
PostHog Product Analytics SOC 2 Type II

Penetration Testing

External penetration testing conducted annually by independent third-party auditors

Critical and high findings remediated within 30 days

Summary reports available to enterprise customers under NDA

Security Documentation

The following documents are available on request:

Security Whitepaper

Penetration Test Summary

AI Model Card

Data Processing Agreement (DPA)

VSA Full / VSA Core Assessment

SIG Lite Assessment

SOC 2 Type II Report

Request access at exterview.ai/contact or email security@exterview.ai.

Responsible Disclosure

If you discover a security vulnerability in the Exterview platform, please report it responsibly:

Response SLA: Acknowledgment within 24 hours, triage within 72 hours

We do not pursue legal action against researchers who report vulnerabilities in good faith.

Contact Us

For security-related questions:

Trust Center: exterview.ai/trust

Address: Exterview Inc., 16192 Coastal Highway, Lewes, Delaware 19958, USA