Security

Last updated: March 26, 2026

WardenIQ is built for freight brokerages that handle sensitive pricing, customer, and carrier data. Security is foundational to our architecture, not an afterthought.

Infrastructure

US-Based Hosting

All data is stored on dedicated servers in US data centers. We do not use shared hosting or multi-tenant cloud databases.

TLS Everywhere

All connections use TLS 1.2+ encryption in transit. No unencrypted HTTP connections are accepted.

Firewall & Rate Limiting

UFW firewall with only ports 22, 80, and 443 open. API rate limiting, connection limits, and Fail2Ban intrusion prevention.

Tenant Isolation

Every database query is scoped to your tenant ID. There is no way for one organization to access another's data, even at the database level.

Data Protection

Email Permissions

WardenIQ uses two distinct permission scopes. They are independent: you can use the Outlook Add-in without ever connecting Microsoft Graph, and vice-versa.

1. Outlook Add-in (the in-Outlook panel)

The add-in requests the ReadItem permission level — the lowest available for Outlook mail add-ins. Within the add-in panel:

2. Inbox Monitoring & Reply Automation (Microsoft Graph API, optional)

If you opt in to inbox monitoring or reply automation, WardenIQ requests the following Microsoft Graph API scopes via Microsoft's standard OAuth consent flow:

These permissions are broader than the add-in's ReadItem scope. They are opt-in per tenant. You can revoke access at any time from your Microsoft 365 admin center (Azure Active Directory → Enterprise Applications). OAuth refresh tokens are encrypted at rest using Fernet symmetric encryption and are tenant-isolated; no other tenant or third party can access them.

What happens with email content sent to our servers

AI & Data Processing

Access Controls

FeatureAdminMember
View own quotes & lanesYesYes
View team quotesYesOwn team only
Manage users & rolesYesNo
View all teams' dataYesNo
Billing & subscriptionYesNo

Incident Response

In the event of a security incident affecting customer data, we will notify affected customers within 72 hours via email with details of the incident, data affected, and remediation steps taken.

Responsible Disclosure

If you discover a security vulnerability, please report it to [email protected]. We take all reports seriously and will respond within 48 hours.

Questions

For security-related questions, contact [email protected]. For general support, visit our support page.