Security
Security starts with a small, controlled surface.
CategoryVantage is early and deliberately bounded. The public site does not
host a customer login, payment flow, upload portal, or private customer-data
workspace. Security posture expands before the data surface expands.
HTTPS public site
SPF and DKIM-aligned business mail
Separate enterprise controls before private data
Current surface
Static public site and business email.
The current public footprint is intentionally simple: marketing pages,
mailto-based contact paths, managed DNS, and a business mailbox. This keeps
the exposed attack surface smaller while the product offer is shaped.
Access
Least-useful-access by default.
Access is limited to the people and services needed to operate the domain,
site, mailbox, and demos. Credentials and admin access are not handled as
shared working notes.
Data
Minimize before collecting.
The public site does not request sensitive customer data. Future private
customer-data programs are handled through separate scope, purpose, access,
retention, and review controls before collection.
Claims
No premature certification claims.
CategoryVantage does not claim SOC 2, ISO 27001, HIPAA, PCI, or formal
penetration-test completion unless those controls are actually completed and
available for review.
Operating controls
Security controls match the data risk.
Public site delivery
Use HTTPS, managed DNS, minimal scripts, and a static asset surface where possible.
Email reliability
Keep MX, SPF, DKIM, and mailbox monitoring in place before relying on the domain for commercial communication.
Internal artifacts
Separate raw data, proof artifacts, truth layers, and customer-facing outputs so mistakes do not silently propagate.
Incident handling
Security reports, suspected mailbox issues, DNS changes, and exposure concerns are routed for review.
Transport
Encrypted delivery by default.
The public site is served over HTTPS. Mail and DNS are configured through
managed providers, with sender authentication records used to reduce spoofing
and delivery risk.
Secrets
No credentials in public workflows.
Passwords, API keys, tokens, and admin credentials are not handled through
demo requests, screenshots, email threads, or support notes. If a secret is
exposed, it is treated as a rotation issue rather than normal debug context.
AI boundary
AI assistance is not a security bypass.
AI-generated summaries or classifications do not replace source evidence,
access controls, customer approval, or policy review. Sensitive data is not
routed into uncontrolled prompts or temporary files.
Customer data
Separate workspace before sensitive data.
The Proof-Gated Decision Layer works from public evidence first. Private
customer datasets, account strategy, margin, inventory, and tenant data are
handled through a scoped workspace with clear access, retention, audit, and
vendor-review expectations before use.