Security
Enterprise-grade security at every layer
Rankmint is built with security, privacy, and compliance as foundational requirements. Your data is protected by industry-standard encryption, access controls, and audit capabilities.
SOC 2 Type II Ready Architecture
Built from the ground up with SOC 2 compliance in mind. Access controls, change management, risk assessment, and monitoring practices are embedded in every layer of the platform.
Encryption at Rest
All data is encrypted at rest using AES-256 encryption through our infrastructure providers. Database backups, file storage, and cached data are all encrypted by default.
Scoped API Keys
Generate API keys with granular permission scopes. Restrict keys to specific workspaces, resources, and operations. Revoke instantly, monitor usage, and enforce rate limits.
MFA-Ready Authentication
Multi-factor authentication support with TOTP-based second factors. Enforce MFA policies at the organization level. Supports SSO integration for enterprise deployments.
Comprehensive Audit Logs
Immutable audit trail for every significant action in the platform. Who changed what, when, and from where. Exportable for compliance reviews and security investigations.
Role-Based Access Control
12 predefined roles from Super Admin to Restricted Viewer. Granular permissions cover workspace management, publish approvals, billing access, API access, and admin-only controls.
Signed Webhooks
Every outgoing webhook is signed with HMAC-SHA256 using a per-endpoint secret. Verify authenticity and prevent tampering on your receiving systems.
Data Retention Controls
Configure how long crawl data, snapshots, logs, and report artifacts are retained. Meet regulatory requirements with automated data lifecycle management.
Privacy-Aware Exports
Export controls that respect data classification. PII redaction options, export logging, and format controls ensure sensitive data stays protected during sharing.
Session Management
View and manage active sessions across devices. Force logout, session timeout policies, and IP-based restrictions for sensitive administrative operations.
Infrastructure security
Hosted on industry-leading cloud infrastructure with built-in redundancy, monitoring, and incident response.
Cloud infrastructure
Deployed on SOC 2 certified cloud providers with automatic failover, geographic redundancy, and DDoS protection.
Network security
All traffic encrypted in transit via TLS 1.3. Internal service communication uses mTLS. Regular penetration testing.
Secrets management
API keys, tokens, and credentials stored in isolated secret management systems. Never logged, never exposed in responses.
Monitoring and alerting
24/7 infrastructure monitoring with automated alerting for anomalies, security events, and availability incidents.
Compliance readiness
Have security questions?
Our team is happy to discuss security architecture, compliance documentation, and enterprise deployment options.