šŸ” Security at Brick

At Brick, security is not just a feature—it’s a foundation. Our infrastructure, protocols, and internal practices are designed to meet the highest global standards in data protection, ensuring your business and users remain safe at all times.

šŸ›”ļø Industry Certifications & Standards

  • ISO/IEC 27001:2013 Certified
    Brick complies with globally recognized standards for information security management systems.
  • NIST-Compliant Cryptography
    We follow recommendations from the National Institute of Standards and Technology (NIST):
    • Use of AES-256 for secure data encryption.
    • Implementation of password strength controls per NIST SP 800-63B guidelines.
  • OWASP Best Practices
    Our application layer is secured based on the Open Web Application Security Project (OWASP) standards to defend against the top 10 most common web vulnerabilities.

šŸ”’ Key-Based Encryption Architecture

We employ a custom, multi-party encryption model that ensures no single party—including Brick—can access user data without authorization.

Encryption key distribution is as follows:

ComponentStored ByDescription
userSecretEnd-user's personal deviceTied to the user, accessible only on their device
appSecretYour (client’s) private serversControlled by your business
Encrypted Private KeyBrick's secure serversUnique per client, stored encrypted

To decrypt user data, all three components must be combined. This means:

šŸ‘

Even Brick cannot access unencrypted user data—not even in the event of a breach.

What This Means for You

  • Even if Brick’s database were compromised, user data would remain encrypted and unusable.
  • Brick employees, engineers, and even founders cannot access raw user data.
  • Access to a user's data would require physical access to the user’s device, your app server, and Brick’s encrypted database—an exceedingly improbable scenario.

āœ… Going Beyond Industry Norms

Most platforms store encryption keys on their own servers—accessible by internal teams. Brick’s decentralized encryption architecture ensures:

  • Zero internal access
  • Zero tolerance for key sharing
  • Maximum protection, by design

Security is in our DNA. With Brick, you’re not just integrating a platform—you’re choosing a partner that treats your users' data like its own: with uncompromising care.