Security and compliance you can trust

Built on AWS with infrastructure as code, managed services, and enterprise-grade security controls. Your construction data deserves the same protection as your buildings.

Our Commitment

Redline is built from the ground up with security in mind. Our AWS-native architecture with CDK infrastructure as code means every deployment is consistent, auditable, and follows security best practices. We're actively working toward SOC 2 Type II certification and maintain alignment with industry security frameworks.

Security controls in place

Enterprise-grade security built into every layer of the platform.

Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3). Keys managed via AWS KMS with automatic rotation.

Access Control

SSO/SAML authentication, MFA for all accounts, least-privilege IAM policies, and regular access reviews.

Audit Logging

Complete audit trail via AWS CloudTrail. All actions logged, timestamped, and retained for compliance.

Infrastructure

100% AWS-hosted with infrastructure as code (CDK). GuardDuty threat detection, automated patching, and DR tested.

Vulnerability Management

SAST/DAST scanning in CI/CD, dependency scanning, container image scanning, and defined patch SLAs.

Data Residency

Data stored in US regions. Clear subprocessor list and data processing agreements available on request.

Certification roadmap

Our path to enterprise compliance certifications.

In Progress Tier 1

SOC 2 Type II

Security, availability, and confidentiality controls

Planned Tier 1

ISO 27001

Information security management system

Ready Tier 1

CCPA/CPRA

California privacy compliance

Planned Tier 2

ISO 27017

Cloud security controls

Planned Tier 2

ISO 27018

PII protection in public cloud

Planned Tier 2

CSA STAR

Cloud security assurance

Framework alignment

Self-attestable compliance with industry security frameworks.

NIST CSF

Aligned security program

CIS Controls v8

Baseline implementation

OWASP ASVS

Application security

AWS Well-Architected

Security & reliability pillars

Construction industry standards

Built with awareness of construction-specific requirements and interoperability.

BIM Interoperability

  • IFC format support (buildingSMART)
  • RVT (Revit) model viewing
  • ISO 19650 awareness (BIM information management)
  • NBIMS-US compatibility positioning

Contract Awareness

  • AIA digital data protocols
  • BIM execution plan compatibility
  • Immutable audit trail for disputes
  • Export for owner meetings and handover

Need security documentation?

Request our security whitepaper, SOC 2 readiness documentation, or answers to your vendor security questionnaire.