Security & Compliance
Built by a team of Stanford, Palantir, and IDF engineers, Closure was designed to protect the most sensitive information involved in investigations and prosecutions.
Compliance

SOC 2 Type II
Externally validated by independent auditors

CJIS
Adherant to the FBI CJIS Security Policy

HIPAA
Healthcare data protection standards
Security Architecture
Zero Access Architecture
Closure employees cannot access customer data by default; support access requires explicit customer authorization of cleared personnel
Encryption
Following CJIS standards, including AES-256 encryption, FIPS 140-3 generated keys, encryption at-rest and in-transit (HTTPS/TLS 1.2+)
Access Control
Following CJIS Controls, including Role-Based Access Controls, Single Sign-On, Multi-factor Authentication, and strict account segregation
Logging & Monitoring
Comprehensive logging of all actions in the platform, auditable user actions and data access
Frequently Asked Questions
Have additional security questions?
Contact Us