Security / Compliance

Compliance without ceremony.

SOC 2 posture, PCI considerations, logging, and retention that match enterprise expectations.

01

Frameworks

  • SOC 2-aligned controls; evidence gathered continuously.
  • PCI-aware payment flows with provider-scoped tokens.
  • Data residency options based on customer requirements.

02

Logging and retention

  • Structured logs with tenant and correlation IDs.
  • Retention by data class; export paths on request.
  • Tamper-evident audit logs for key actions.
Security — Compliance | Abon