Security overview

How we keep your work safe.

Version 1.0 · Effective May 15, 2026

Cruma is private-beta software with production data running through it. Security isn't a checklist for marketing — trust is a primitive, baked into the product architecture. This page is the public version of how we approach it. The contractual version is the DPA §6.

Beta caveat. Cruma is in private beta. We do not yet have a SOC 2 or ISO 27001 report. We follow the practices below and will pursue formal certification when the cohort and roadmap warrant it (post-V1.5). Until then, enterprise customers should treat this overview as a current-state description, not a long-running attestation.

1 · Architecture

2 · Access control

3 · AI provider security

4 · The approval rail

Cruma is built around a glass-box approval model: high-risk actions (sending mail, booking meetings, writing externally-visible content) propose-and-wait for your review. The approval rail is not a feature; it is the OS-level permission layer of the product, enforced at the skill-runtime boundary. Bypassing it is a contractual violation under the AUP §4.

5 · Vendor & sub-processor review

6 · Vulnerability disclosure

If you discover a security vulnerability in Cruma, please report it to security@cruma.ai. We follow RFC 9116 (security.txt); machine-readable contact info is at /.well-known/security.txt.

7 · Incident response

8 · Dependency & supply-chain hygiene

9 · Data retention & deletion

Specific retention windows are published in the Privacy Policy §7. Hard-delete on workspace deletion; backups age out on a 30-day cycle.

10 · Roadmap

11 · Contact

Vulnerability disclosure: security@cruma.ai
Privacy / data requests: privacy@cruma.ai
Legal: legal@cruma.ai