Skip to main content
COLA Cloud takes reasonable measures to protect customer data and the integrity of its platform. This document describes our current security posture.

Infrastructure

COLA Cloud runs on Amazon Web Services (AWS) with Snowflake as the data warehouse and Cloudflare for CDN, WAF, and DNS. All infrastructure providers maintain SOC 2 Type II certifications.
PropertyDetail
Compute & storageAWS (managed compute, managed relational database, object storage)
Data warehouseSnowflake
CDN / WAF / DNSCloudflare (DDoS protection, bot mitigation, DNSSEC)

Authentication & Access Control

  • Customer authentication: Email/password with secure hashing, or Google OAuth 2.0
  • API authentication: Bearer token (API keys), scoped to individual user accounts
  • MCP authentication: Bearer token passthrough using customer’s API key
  • Internal access: Key-based authentication only; no password-based access to production systems

Data in Transit

All data in transit is encrypted via TLS 1.2 or higher. Unencrypted HTTP requests are redirected to HTTPS. API endpoints enforce HTTPS and reject plaintext connections.

Data at Rest

ComponentEncryption
Application databaseAES-256, managed encryption keys
Data warehouseAES-256, managed by Snowflake
Object storageServer-side encryption, versioning enabled
BackupsEncrypted, automated

Payment Processing

COLA Cloud does not store, process, or have access to customer credit card numbers. All payment processing is handled by Stripe, a PCI DSS Level 1 certified payment processor. Customer billing is managed entirely through Stripe’s hosted checkout and billing portal.

Data Handling

What We Store About Customers

  • Account information (name, email)
  • Stripe customer ID (for billing)
  • API keys (hashed)
  • Usage metrics (request counts per billing period)

What We Don’t Store

  • Credit card numbers or payment method details (handled by Stripe)
  • Customer query content or search history beyond usage counts

Licensed Data

The COLA dataset consists of public government records and proprietary enrichments. It does not contain personal consumer data. Applicant business information (company names, permit numbers, business addresses) originates from the TTB’s public registry.

Incident Response

  • Breach notification: Customers will be notified within 72 hours of discovering any unauthorized access to their account data
  • Post-mortems: Written root cause analysis provided for significant incidents
  • Contact: Security concerns can be reported to help@colacloud.us

What We Don’t Have (Yet)

In the interest of transparency:
  • SOC 2 report — COLA Cloud does not currently hold a SOC 2 certification. Our infrastructure providers (AWS, Snowflake, Stripe, Cloudflare) each maintain their own SOC 2 Type II certifications.
  • Penetration testing — No formal third-party penetration test has been conducted.
  • Bug bounty program — Not currently offered.
  • Business continuity plan — Disaster recovery relies on managed cloud services (automated backups, multi-AZ durability). No formal BCP document exists.
These are areas we expect to invest in as the business scales.
Questions? Contact help@colacloud.us