SOC 2 Type II, Zero Data Retention, GDPR, and Single Sign-On ship on every Linkup tier. For customers with the highest data sovereignty requirements (banks, government, defense, regulated healthcare), the full Linkup index and infrastructure deploy inside the customer’s own VPC: Bring Your Own Cloud. Queries never leave that environment.Documentation Index
Fetch the complete documentation index at: https://docs.linkup.so/llms.txt
Use this file to discover all available pages before exploring further.
Trust Center
SOC 2 reports, subprocessor list, and policy documentation.
Bring Your Own Cloud (BYOC)
For the highest data sovereignty requirements, Linkup deploys the full search index and processing inside the customer’s virtual private cloud. Properties:- Queries never leave the customer’s environment.
- Search results never leave the customer’s environment.
- The Linkup index is replicated inside the VPC and updated through the customer’s egress controls.
- Suitable for banks, government, defense, and regulated healthcare buyers who cannot route queries to a third-party SaaS.
support@linkup.so to scope a deployment.
Certifications and compliance
- SOC 2 Type II certified. Security, availability, and confidentiality controls. Report available upon request.
- GDPR compliant. EU data residency available.
- Zero Data Retention available on every tier.
- Single Sign-On, IP whitelisting, role-based access.
Data encryption
- In transit: TLS 1.2+ for all API communications.
- At rest: AES-256 for any stored data.
- Key management: enterprise key management services with strict access controls.
Infrastructure security
- Cloud infrastructure: hosted on Microsoft Azure with EU and US regions.
- Network security: VPC segregation, network segmentation via security groups and ACLs, multi-layer firewalls, DDoS protection, no public database endpoints.
- Hardening: baseline configurations, timely patching, least-privilege service roles.
Privileged access management
Privileged and administrative access requires multi-factor authentication with strict role-based access control.
All privileged access is logged, continuously monitored, and regularly reviewed.
Access follows least-privilege principles with just-in-time elevation where applicable.
Vulnerability management and secure development
Independent scans (Bastion Technologies) with tracked remediation.
Independent assessors validate controls and exploit paths.
Automated threat detection and alerting across infrastructure and apps.
Defined timelines by severity for fast, predictable fixes.
Design reviews, code scanning, dependency checks, and secure API patterns.
Regular training to maintain security awareness and best practices.
Crawling safeguards
Blocks malware, phishing, and malicious sources before indexing or serving.
Ranking protects against sensitive and prohibited content exposure.
High-risk sites are automatically blocked.
Control results via the
excludeDomains API parameter.Respect for
robots.txt; no circumvention of CAPTCHAs or access controls.Custom requirements
We accommodate custom breach notification timelines, tailored remediation SLAs, dedicated security reviews, and bespoke compliance reporting on contracted plans. Contactsupport@linkup.so.