Shared Responsibility Model
Last updated: February 24, 2026
Security is a shared responsibility. STET secures the desktop app runtime, the website and support surfaces, and the limited account or billing data we hold. Your organization is responsible for how you use STET, what data you process through it, and your own access controls. The infrastructure providers (InsForge, Vercel, Box, Dropbox) are responsible for the physical and network layers they control.
This document defines those boundaries precisely. It is intended for security questionnaires, vendor assessments, and internal IT reviews.
STET's Responsibilities
What we own and guarantee
- ·Securing the STET desktop app runtime, website/support surfaces, and API endpoints
- ·Patching application-layer vulnerabilities
- ·Input validation and injection prevention
- ·Rate limiting and abuse protection
- ·Content Security Policy headers
- ·CSRF protection on all mutating routes
- ·Vercel deployment configuration and access controls
- ·InsForge project configuration, RLS policies, and schema security
- ·Secrets management (API keys, signing secrets) in CI/CD
- ·Dependency vulnerability monitoring
- ·TLS certificate management
- ·Encryption of OAuth tokens at rest (AES-256)
- ·Encryption of all data in transit (TLS 1.3)
- ·Row-level security ensuring org data isolation
- ·Secure deletion of data upon account termination
- ·Audit log integrity within STET's systems
- ·InsForge Auth configuration and session management
- ·Password hashing (bcrypt via InsForge)
- ·Secure password reset token issuance
- ·OAuth state parameter validation for VDR connections
- ·SSO/SAML configuration for enterprise customers
- ·Tauri sandbox configuration and capability restrictions
- ·Rust binary integrity (signed NSIS installer)
- ·WebView Content Security Policy enforcement
- ·Native file access scoped to user-selected directories only
- ·Monitoring STET's infrastructure for anomalies
- ·Notifying affected customers of data breaches within 72 hours
- ·Coordinating response to vulnerabilities reported via responsible disclosure
- ·Maintaining sritej@trystet.com for reports
Your Organization's Responsibilities
What you own as the customer
- ·Accuracy and completeness of files uploaded for reconciliation
- ·Ensuring you have authorization to process the data through STET
- ·Obtaining required consents for any personal data in your files
- ·Exporting and retaining audit logs per your regulatory requirements (SOX: 7 years, GLBA: 7 years, MiFID II: 5 years)
- ·Protecting your STET account credentials
- ·Revoking access for departed team members promptly
- ·Managing VDR OAuth connections (revoking Box/Dropbox tokens when no longer needed)
- ·Enforcing MFA if required by your organization's policy
- ·Auditing organization member list regularly
- ·Your organization's obligations under SOX, GLBA, GDPR, CCPA, MiFID II, PCAOB, or any other framework
- ·Classifying STET outputs correctly (technical record of software processing — not an audit opinion)
- ·Professional review of all reconciliation results before reliance
- ·Ensuring STET is used within the scope permitted by your firm's policies
- ·NDA and confidentiality obligations for deal data processed through STET
- ·Your Box and Dropbox account security (passwords, MFA, access logs)
- ·Access permissions on files within your VDRs
- ·User management within your Box/Dropbox organization
- ·Compliance with Box's and Dropbox's acceptable use policies
- ·Security of the devices running STET
- ·OS patching and endpoint protection on your machines
- ·Network security (VPN, firewall) on your organization's network
- ·Physical access controls to machines with STET installed
- ·Interpreting all reconciliation results and discrepancy flags
- ·Determining materiality of flagged discrepancies
- ·Deciding whether AI-assisted (semantic) match results are correct
- ·All business, risk, and regulatory decisions based on STET outputs
Infrastructure Provider Responsibilities
What our certified providers own
- ·Physical security of database infrastructure
- ·Postgres database engine security and patching
- ·Auth server security and availability
- ·Storage bucket encryption and access control infrastructure
- ·Network isolation between InsForge tenants
- ·Physical security of edge network and compute infrastructure
- ·Next.js runtime environment patching
- ·DDoS protection and edge network availability
- ·TLS termination infrastructure
- ·Physical security of document storage infrastructure
- ·Document encryption at rest and in transit
- ·OAuth infrastructure security
- ·Availability and durability of stored files
- ·Access logging within their platforms
What STET Explicitly Does Not Do
Hard boundaries for security questionnaires
- Store, copy, or transmit document contents to STET-controlled servers
- Use customer data to train, fine-tune, or improve any machine learning model
- Share customer data with third parties for any purpose other than delivering the service
- Access Box or Dropbox files beyond what is required for metadata and hash computation
- Handle raw payment card data (Enterprise billing is managed via MSA, not card processing)
- Retain personal data after account termination beyond legal minimums
- Make audit opinions, provide legal advice, or certify regulatory compliance
- Access the desktop app's local file system beyond directories the user explicitly selects
Questions about this document or security assessments?
sritej@trystet.com·STET, Inc. · Wilmington, Delaware