Skip to Content
Prism Context Engine v1.0.3 - Now with FlexSearch & Azure OpenAI!
Security & Privacy

Security & Privacy

How Prism Context Engine protects your data.

Overview

Prism Context Engine is designed with security and privacy as core principles. Your rules, code context, and team data are protected at every level.


Architecture Security

Data Flow

┌─────────────────┐ TLS 1.3 ┌─────────────────┐ │ Your IDE │─────────────────▶│ MCP Server │ │ (local) │ │ (local) │ └─────────────────┘ └────────┬────────┘ │ TLS 1.3 ┌─────────────────┐ │ Prism Cloud │ │ (API) │ └────────┬────────┘ │ Encrypted ┌─────────────────┐ │ Azure Cosmos │ │ (AES-256) │ └─────────────────┘

What We Store

DataStoredPurpose
Rules/Content✅ YesCore functionality
Video Files✅ YesTranscription/extraction
API Keys✅ Yes (hashed)Authentication
Your Code❌ NoNever transmitted to our servers
Search Queries✅ Yes (30 days)Analytics & improvement
Usage Metrics✅ YesBilling & analytics

Your actual source code never leaves your machine. Only rule queries and metadata are transmitted.


Authentication & Access Control

API Key Security

  • Keys are hashed with bcrypt before storage
  • We never store or can retrieve plain-text keys
  • Keys can be scoped to specific permissions
  • All key usage is logged

Multi-Factor Authentication

  • MFA available for all accounts
  • Required for admin actions
  • TOTP and WebAuthn supported

Role-Based Access Control

RolePermissions
OwnerFull access, billing, delete org
AdminManage team, rules, projects
EditorCreate/edit rules, view all
ViewerRead-only access

Data Protection

Encryption

In Transit:

  • TLS 1.3 for all API communications
  • Certificate pinning for mobile apps
  • HSTS enforced

At Rest:

  • AES-256 encryption for all stored data
  • Azure managed encryption keys
  • Optional customer-managed keys (Enterprise)

Data Residency

PlanData Location
Starter/ProUS (Azure East)
TeamUS or EU (choice)
EnterpriseCustom regions

Backup & Recovery

  • Automated daily backups
  • Point-in-time recovery (30 days)
  • Geo-redundant storage
  • Regular recovery testing

MCP Server Security

Local Execution

The MCP server runs locally on your machine:

Your Machine ├── IDE (Cursor, Windsurf, etc.) ├── MCP Server (prism-mcp) │ ├── Local caching │ ├── API key storage │ └── Network requests to Prism Cloud └── Your Code (never transmitted)

What the MCP Server Does

Does:

  • Fetch rules from Prism Cloud
  • Cache rules locally
  • Provide rules to your IDE’s AI

Does NOT:

  • Read your source code
  • Transmit your code anywhere
  • Store your code

Network Requests

MCP server makes requests only to:

  • api.prismcontext.com — Fetch rules
  • telemetry.prismcontext.com — Anonymous usage stats (opt-out available)

Compliance

SOC 2 Type II

We maintain SOC 2 Type II certification covering:

  • Security
  • Availability
  • Processing Integrity
  • Confidentiality

Request our SOC 2 report: security@prismcontext.com

GDPR

For EU customers:

  • Data Processing Agreement (DPA) available
  • Right to access, correct, delete data
  • Data portability supported
  • EU data residency option

HIPAA

Prism is not currently HIPAA compliant. Do not store PHI in rules.


Security Practices

Infrastructure

  • Azure cloud hosting with enterprise SLAs
  • DDoS protection via Azure Front Door
  • Web Application Firewall (WAF)
  • Regular penetration testing

Development

  • Secure SDLC practices
  • Dependency scanning (Dependabot)
  • Static code analysis (CodeQL)
  • Required code reviews

Monitoring

  • 24/7 automated monitoring
  • Intrusion detection systems
  • Anomaly detection on API usage
  • Real-time alerting

Vulnerability Reporting

Found a security issue? We appreciate responsible disclosure.

Reporting Process

  1. Email: security@prismcontext.com
  2. Include:
    • Description of vulnerability
    • Steps to reproduce
    • Potential impact
    • Your contact info

Response Timeline

StageTimeline
Acknowledgment24 hours
Triage3 business days
Fix (critical)7 days
Fix (high)30 days
Fix (medium/low)90 days

Bug Bounty

We offer rewards for qualifying vulnerabilities:

  • Critical: $500-$2000
  • High: $200-$500
  • Medium: $50-$200

Privacy Policy

Data Collection

We collect only what’s necessary:

  • Account information (email, name)
  • Rules and content you create
  • Usage analytics (anonymized)
  • Support communications

Data Use

Your data is used for:

  • Providing the service
  • Improving the product
  • Billing and support
  • Legal compliance

Data Sharing

We do NOT:

  • Sell your data
  • Share with advertisers
  • Use for training AI models without consent
  • Share with third parties except:
    • Service providers (Azure, Stripe)
    • Legal requirements

Data Retention

Data TypeRetention
AccountUntil deletion
RulesUntil deletion
Videos90 days after processing
Logs30 days
Backups30 days

Your Rights

  • Access your data
  • Export your data
  • Correct inaccuracies
  • Delete your account
  • Opt-out of analytics

To exercise rights: privacy@prismcontext.com


Best Practices for Users

API Key Security

✅ DO: - Store keys in environment variables - Use scoped keys with minimum permissions - Rotate keys regularly - Delete unused keys ❌ DON'T: - Commit keys to version control - Share keys via chat/email - Use same key for all environments

Rule Content

✅ DO: - Include only necessary context - Use generic examples - Reference documentation ❌ DON'T: - Include secrets or credentials - Include customer/user data - Include proprietary business logic

Contact

Security Team: security@prismcontext.com

Privacy Team: privacy@prismcontext.com

DPA Requests: legal@prismcontext.com


Last updated on
Prism Context EnginePrism Context Engine

The Context Operating System for developers who ship fast. Eliminate AI hallucinations with governed context rules.

Documentation

Product

Start a Project

Ready to eliminate context pollution? Let's get you started.

GET_STARTED
© 2026 JD Studio.DTI: VL1927082895984