Encryption
AES-256 at rest. TLS 1.2+ in transit. Keys managed by industry-standard cloud KMS.
Construction operations run on sensitive documents — bid pricing, contracts, drawings, project records. We’ve built Pelles to handle them with the rigor a procurement team would expect, and this page tells you the truth about where every framework and control stands today.
One row per framework. Status badges read green for attested, amber for in progress, and cyan for aligned (controls in place, no formal certification).
The technical and operational controls Pelles runs on right now. Every item below is true today — nothing aspirational on this page.
AES-256 at rest. TLS 1.2+ in transit. Keys managed by industry-standard cloud KMS.
SSO and SAML available to enterprise customers on request. Role-based access control. Multi-factor authentication. Least-privilege internal access.
Multi-tenant by default with strict logical isolation. Single-tenant and customer-managed cloud deployments offered to enterprise customers on request.
Key user actions are logged with user, timestamp, and resource. Logs are exportable for customer audit needs.
Project documents, conversations, and outputs stay isolated to your tenant. No cross-tenant data flow, no shared embeddings.
We do not train models on customer data — neither the documents you upload nor how you use the platform (queries, conversations, telemetry).
Hosted on industry-leading cloud infrastructure (SOC 2 Type II and ISO 27001 attested). Automated backups.
Annual third-party penetration test completed in 2026 (all resolved). Executive summary available to customers under NDA.
The four ideas the technical controls above are built on. They shape every decision — not just the ones a checklist asks about.
Internal access to customer data is scoped to the minimum required and granted only when needed. Default-deny, not default-allow.
No single control protects customer data. Encryption, tenant isolation, access controls, and audit logging operate independently — a failure in one shouldn’t compromise the rest.
Your project data is yours. We do not train models on it and do not use it to improve our product without explicit consent.
Privileged actions are logged. Configuration changes are versioned. The platform is designed so that, when an auditor asks what happened, you can show them.
Reach out and we’ll route your request to the right person. We’ll get back to you within one business day to walk through whatever you need.