< Back to home
Security

Security & Trust at Rastro

Rastro is built for enterprise catalog workflows where customer data, AI outputs, and operational decisions need controlled handling.

We used to build production e-commerce systems at Uber and Shopify. Your data is in good hands.

Last updated: May 2026security@rastro.ai

Security posture

Rastro's security work is focused on the controls that matter most for catalog operations: access, encryption, change control, vendor oversight, incident response, privacy review, and bounded AI use.

Least-privilege access and unique user accounts.
TLS in transit and cloud/provider-managed encryption at rest.
Controlled production changes through review, testing, and deployment controls.
Customer catalog data is not used to train general-purpose models.

Infrastructure and access

Rastro's production environment is cloud-hosted. Rastro does not operate physical data centers, server rooms, or production hardware facilities.

Production systems use environment separation, restricted administrative access, private source repositories, secrets management, monitoring, and controlled deployment paths.

Data handling and AI use

Customer data is processed only as needed to provide supplier onboarding, catalog enrichment, workflow, support, and related business services.

Rastro uses AI to support requested catalog workflows, including:

  • supplier-file reformatting
  • attribute extraction and normalization
  • SKU, category, and catalog-field mapping
  • catalog enrichment using customer-approved sources
  • catalog completeness and quality checks

Vendors and subprocessors

Rastro uses a focused provider stack. Providers with access to customer data or production systems are subject to contractual, confidentiality, privacy, and security obligations.

Rastro subprocessors
ProviderPurposeData category
AWSCloud infrastructure, hosting, storage, compute, networkingCustomer data, system data, logs
SupabaseDatabase, authentication, storage, backend servicesCustomer data, user/account data, system data
VercelApplication hosting, frontend deployment, site analyticsApplication data, limited logs, usage analytics
Temporal CloudWorkflow orchestrationWorkflow metadata, processing state
OpenAIAI model/API processing for catalog enrichment workflowsCustomer-provided catalog/supplier data submitted for requested workflows
DatadogObservability, monitoring, logging, alertingSystem telemetry, logs, operational metadata
ResendTransactional emailBusiness contact data, email metadata
Cal.comScheduling for demo and customer conversationsBusiness contact and scheduling data

Rastro updates this list when material subprocessors change. Customer-specific notice requirements are handled under the applicable agreement.

Incident response, privacy, and assurance

Rastro maintains incident response procedures for triage, containment, remediation, escalation, and customer notification. Suspected vulnerabilities can be reported using the security contact listed above.

Rastro supports applicable privacy and security obligations, including GDPR/UK GDPR where applicable. A DPA and security documentation are available to customers under NDA or appropriate contractual terms.

Rastro does not currently publish an external security certification, audit report, or penetration test report. External vulnerability scanning or penetration testing is planned, and summaries may be shared with customers under NDA when completed.

Documents available on request

The following materials may be made available to customers under NDA or appropriate contractual terms:

  • Security Controls Summary
  • Data Processing Addendum
  • Subprocessor details
  • AI Data Use Summary
  • Incident Response Summary
  • Business Continuity and Backup Summary
  • Vendor Risk Summary
  • Access Control Summary