Security
End of Line is built with security and data protection at its core. Your call data is sensitive — we treat it that way.
Data Encryption
In transit
All data transmitted between your browser, our API, and our infrastructure is encrypted using TLS 1.3. This includes:
- Browser to API server communication
- API server to database connections
- API server to vector store (Qdrant) connections
- API server to knowledge graph (Neo4j) connections
- Worker to storage (S3) connections
At rest
All stored data is encrypted at rest using AES-256:
- Call recordings — Stored in AWS S3 with server-side encryption (SSE-S3)
- Database — PostgreSQL on AWS RDS with storage encryption enabled
- Vector embeddings — Qdrant collections encrypted at the disk level
- Knowledge graph — Neo4j data encrypted at the volume level
Tenant Isolation
End of Line uses a strict multi-tenant architecture where each customer's data is completely isolated:
- Database isolation — Each tenant's data is stored with a tenant ID foreign key. All queries are automatically scoped to the authenticated tenant through middleware enforcement.
- Vector store isolation — Each tenant has a separate Qdrant collection. Cross-tenant search is impossible at the storage level.
- Knowledge graph isolation — Graph data is partitioned by tenant ID. All Cypher queries include tenant filtering.
- Storage isolation — Call recordings in S3 are stored under tenant-specific prefixes with IAM-scoped access.
Tenant context is enforced at the API middleware level — every request is authenticated and scoped to a single tenant before reaching any business logic.
Authentication & Access Control
- User authentication — Powered by Stack Auth with secure JWT tokens. Supports email/password and social login (Google, GitHub).
- Organization-based access — Users belong to organizations (tenants). Switching organizations requires re-authentication.
- API key authentication — For server-to-server integration. API keys are hashed at rest and can be revoked instantly.
- Role-based access — Organization owners can manage team member permissions.
Infrastructure Security
- AWS infrastructure — All infrastructure runs on AWS (us-east-1) with VPC isolation, security groups, and IAM roles.
- No public database access — PostgreSQL, Qdrant, and Neo4j are accessible only within the VPC or through authenticated API endpoints.
- Automated backups — Database backups run daily with 30-day retention. Point-in-time recovery is enabled.
- Monitoring — Infrastructure is monitored with CloudWatch alerts for anomalous activity.
Compliance
SOC 2 Readiness
End of Line follows SOC 2 Type II principles for security, availability, and confidentiality:
- Access controls and authentication on all systems
- Encryption of data in transit and at rest
- Audit logging of all administrative actions
- Incident response procedures documented and tested
- Regular vulnerability assessments
GDPR Readiness
End of Line supports GDPR compliance for customers handling EU personal data:
- Data portability — Export all your data via API or CSV at any time
- Right to deletion — Request deletion of all tenant data including recordings, transcripts, and derived data
- Data processing agreement — Available for Business and Enterprise customers
- Data residency — Currently US East (us-east-1). EU data residency available for Enterprise customers on request.
Data Retention
- Active accounts — Data is retained for as long as your account is active
- Cancelled accounts — Data is retained for 90 days after cancellation, then permanently deleted
- Deletion requests — Data deletion requests are processed within 30 days
Security Reporting
If you discover a security vulnerability, please report it responsibly by emailing security@endofline.ai. We take all reports seriously and will respond within 48 hours.