Back to operations
Security

Built for the most cautious operator.

OAuth-based authentication, encrypted tokens, read-only analysis — and a clear path to disconnect at any time.

Effective: May 11, 2026

Private pilot

ISURA is currently in private pilot. Features and system behavior may evolve during testing.

Read the pilot status →
01

OAuth-based authentication

ISURA never sees your password. You authorize the connection on your provider's own page (Google or Microsoft) and we receive a scoped, revocable token in return. The same standard your bank, calendar, and operating system use.

02

Encrypted token handling

OAuth tokens are stored encrypted at rest using AES-256, isolated per workspace, and rotated automatically. Tokens are never logged or exposed to client code. Refresh failures are handled silently — you simply re-authorize when needed.

03

Read-only inbox analysis

You can run ISURA in pure read-only mode at any time. In this mode, ISURA can analyze and surface — but cannot draft, queue, or send. Approval-based mode adds drafting, but every send still requires an explicit click from you.

04

Secure infrastructure

Hosted on a hardened cloud with edge runtimes for compute, a managed Postgres database for storage, and TLS 1.3 across all traffic. Production access is multi-factor, audited, and limited to a small number of named engineers. Backups are encrypted and tested.

05

Access revocation

Disconnect ISURA from inside the product or from your provider's security settings. We revoke tokens immediately, stop all background processing, and purge stored analysis artifacts within 24 hours.

06

Responsible disclosure

If you believe you've found a security issue, please tell us privately first. We respond within 48 hours and credit researchers who follow good-faith disclosure.

Contact: security@isura.tech

Questions or requests?

Reach our privacy and trust team directly. We respond within five working days.

privacy@isura.tech