š Security at Brick
At Brick, security is not just a featureāitās a foundation. Our infrastructure, protocols, and internal practices are designed to meet the highest global standards in data protection, ensuring your business and users remain safe at all times.
š”ļø Industry Certifications & Standards
- ISO/IEC 27001:2013 Certified
Brick complies with globally recognized standards for information security management systems. - NIST-Compliant Cryptography
We follow recommendations from the National Institute of Standards and Technology (NIST):- Use of AES-256 for secure data encryption.
- Implementation of password strength controls per NIST SP 800-63B guidelines.
- OWASP Best Practices
Our application layer is secured based on the Open Web Application Security Project (OWASP) standards to defend against the top 10 most common web vulnerabilities.
š Key-Based Encryption Architecture
We employ a custom, multi-party encryption model that ensures no single partyāincluding Brickācan access user data without authorization.
Encryption key distribution is as follows:
Component | Stored By | Description |
---|---|---|
userSecret | End-user's personal device | Tied to the user, accessible only on their device |
appSecret | Your (clientās) private servers | Controlled by your business |
Encrypted Private Key | Brick's secure servers | Unique per client, stored encrypted |
To decrypt user data, all three components must be combined. This means:
Even Brick cannot access unencrypted user dataānot even in the event of a breach.
What This Means for You
- Even if Brickās database were compromised, user data would remain encrypted and unusable.
- Brick employees, engineers, and even founders cannot access raw user data.
- Access to a user's data would require physical access to the userās device, your app server, and Brickās encrypted databaseāan exceedingly improbable scenario.
ā
Going Beyond Industry Norms
Most platforms store encryption keys on their own serversāaccessible by internal teams. Brickās decentralized encryption architecture ensures:
- Zero internal access
- Zero tolerance for key sharing
- Maximum protection, by design
Security is in our DNA. With Brick, youāre not just integrating a platformāyouāre choosing a partner that treats your users' data like its own: with uncompromising care.
Updated 6 days ago