Outreach OS is designed for self-hosted or single-tenant deployments: you retain custody of the database, encryption keys, and integration credentials. This page summarizes the posture buyers typically review before legal and security sign-off.
Procurement
Request the automated compliance bundle (encryption, RBAC, retention, audit) from your workspace admin via GET /api/ops/procurement-fast-lane.
JWT session material is isolated from DATA_ENCRYPTION_KEY. Webhook signing secrets never share the JWT namespace.
Six built-in roles with explicit API permissions enforced in middleware — no silent super-user paths in tenant APIs.
Correlated event ledger, n8n action traces, webhook delivery receipts, and audit entries export as signed evidence packs.
Status reflects product controls and documentation readiness — not a substitute for your counsel or your auditor’s opinion letter.
SOC 2 Type II
Readiness program
Controls mapped to Trust Services Criteria; formal audit engagement is customer-scheduled.
GDPR
Processor-ready
DSAR hooks, configurable retention, and DPA-aligned subprocessors list (deployment-specific).
ISO 27001
Inherited controls
Leverage your cloud provider’s ISO scope; application controls documented in procurement pack.
Update this list for your production footprint and attach it to your DPA annex. The in-app procurement bundle includes a templated subprocessor section you can customize.
Security reviews, RFP questionnaires, and DPA routing.
Set NEXT_PUBLIC_SECURITY_EMAIL (or NEXT_PUBLIC_SALES_EMAIL) in your environment to surface a contact address here.