Velnoro never writes to, modifies, or deletes anything in your Microsoft tenant. Every API call is a read operation. You can verify this in your Entra ID sign-in logs, where all Velnoro activity appears under your own app registration.
When scanning your Microsoft tenant, we collect only resource metadata: names, types, owners, environments, and creation dates. Velnoro never accesses flow definitions, app source code, business data processed by your apps, or chat content. The Program Resources feature additionally allows your team to enter governance documents and upload files, which are stored in your account with the same RLS isolation and access controls.
Your Azure credentials (client ID, client secret, and OAuth tokens) are encrypted at the application layer using AES-256-GCM authenticated encryption before they reach the database. Encryption keys are stored in environment variables, never in the database or source control. All other data at rest is protected by Supabase-managed AES-256 disk encryption.
Every database table enforces row-level security policies. Queries are automatically scoped to your account. One customer can never access another customer's data, even in error conditions. Our most recent RLS audit confirmed 100% coverage across all tenant-scoped tables.
Velnoro requests exactly two API permissions, both read-only. Microsoft Graph Organization.Read.All validates your tenant. Power Platform ResourceQuery.Resources.Read discovers your assets. A formal audit confirmed zero unused permissions and zero overreach.
Free tier scan data is retained for 30 days. Pro plans retain data for 12 months. When you delete your account, all associated data is permanently removed. You can revoke access at any time by removing the app registration from your Entra ID portal.
Velnoro runs on Vercel (application hosting) and Supabase (managed PostgreSQL with automatic backups). Stripe handles all payment processing. All communications use TLS encryption. No credit card data ever touches Velnoro servers.
GDPR and CCPA compliance is addressed through Termly-managed consent, a formal Data Processing Agreement, and documented records of processing. SOC 2 Type I certification is on our roadmap. We conduct regular audits of our RLS policies, API permissions, and encryption practices.
Velnoro uses the following third-party services to deliver the platform. All subprocessors are hosted in the United States.
Our security whitepaper provides a comprehensive overview of Velnoro's security architecture, including encryption, tenant isolation, authentication, data handling, and compliance roadmap. Designed for CISOs and security teams evaluating Velnoro for procurement.
For in-depth security evaluations, we can provide security questionnaire responses, penetration test summaries, detailed infrastructure documentation, and signed security addenda.
Questions about our security practices?
Contact us