Security at PocketFund

Founder data is the most sensitive on the platform.

Cap tables, financial models, term sheets — we treat them with the same controls a Tier-1 bank would.

What we do, in plain English.

Encryption in transit

TLS 1.3 across all endpoints, with HSTS preload. No HTTP fallback, ever.

Encryption at rest

AES-256 on all primary databases, S3 buckets, and backups. Keys managed in AWS KMS with annual rotation.

Role-based access

Internal access governed by least-privilege roles. Only on-call engineers can read production logs. All access audited.

MFA everywhere

Hardware-key MFA mandatory for all employee accounts (Google Workspace, AWS, GitHub, Vercel, Stripe, Postmark).

NDA-gated rooms

Founder data rooms require investor NDA acceptance. Every view is logged. Founders can revoke access with one click.

Audit log

Every read of a founder artefact is timestamped, attributed, and exportable by the founder at any time.

Continuous monitoring

Sentry, CloudWatch, and a SOC2-aligned alerting pipeline. PagerDuty escalation for any P1 incident.

Quarterly pen tests

Independent third-party penetration test every quarter. Latest report available under NDA on request.

Vendor due diligence

Every subprocessor (Stripe, Postmark, Cloudflare, Sentry) vetted annually for SOC2 Type II.

Audits and standards.

🛡SOC 2 Type IIAudited annually
🌐GDPR-compliantEU/UK data subjects
🇮🇳DPDP Act 2023India
🔐ISO 27001In progress, est. Q2 2027
🍃CCPACalifornia residents
📋HIPAABAA available for healthtech founders

Found a vulnerability? Tell us.

We run a responsible-disclosure program. Email security@pocketfund.in with details of the issue, steps to reproduce, and your PGP key (if any). We'll acknowledge within 24 hours, triage within 72 hours, and credit you in our hall of fame on resolution. We pay bug bounties for verified vulnerabilities — see the policy on the contact page.