Closure Logo
Back to Home

Security & Compliance

Built by a team of Stanford, Palantir, and IDF engineers, Closure was designed to protect the most sensitive information involved in investigations and prosecutions.

Compliance

SOC 2 Type II Certification

SOC 2 Type II

Externally validated by independent auditors

CJIS Certification

CJIS

Adherant to the FBI CJIS Security Policy

HIPAA Certification

HIPAA

Healthcare data protection standards

Security Architecture

Zero Access Architecture

Closure employees cannot access customer data by default; support access requires explicit customer authorization of cleared personnel

Encryption

Following CJIS standards, including AES-256 encryption, FIPS 140-3 generated keys, encryption at-rest and in-transit (HTTPS/TLS 1.2+)

Access Control

Following CJIS Controls, including Role-Based Access Controls, Single Sign-On, Multi-factor Authentication, and strict account segregation

Logging & Monitoring

Comprehensive logging of all actions in the platform, auditable user actions and data access

Frequently Asked Questions

Have additional security questions?

Contact Us