Security at Msasa

Msasa is built to help finance teams automate workflows securely. We use a cloud-only architecture and apply security best practices across access control, encryption, secure development, and monitoring.

For security questions or to report a vulnerability, contact: security@msasa.ai

Security overview

Architecture and data flow

Msasa uses the following high-level architecture:

Internal services are segmented from customer-facing interfaces. Where additional internal processing is required, it is handled through controlled service-to-service communication rather than direct end-user access.

Edge protection and service resilience

Msasa relies on managed protections in front of internet-facing services:

Encryption

Identity and access management

Secrets and key management

Secure software development lifecycle (SDLC)

Msasa follows a version-controlled software development lifecycle:

Logging and monitoring

Sub-processors

Msasa uses vetted sub-processors to provide infrastructure, integrations, and AI capabilities. See: Sub-Processors (legal/subprocessors).

Incident response

Msasa maintains an incident response process to triage, contain, and remediate security incidents. Where required by law or contract, we will provide customer notifications consistent with our obligations.

Vulnerability reporting

If you believe you have found a security vulnerability, please email security@msasa.ai with details. We will acknowledge receipt and work to validate and remediate issues in a timely manner.

Last updated: March 2026