Centurion Business, LLC. Security

Last Updated October 13, 2025

Security

We take privacy and data security seriously. That’s why we’re committed to protecting your information using the highest standards of security available. Working with Centurion gives you peace of mind.

Customer Data Protection

Centurion's security systems ensure protection, availability, processing integrity, confidentiality, and privacy of all our customer data.

Employee background checks

Every Centurion employee undergoes a rigorous screening process, which includes multiple interviews and a thorough criminal record check.

Expert help

Each customer’s main point of contact is a dedicated, professionally-trained bookkeeper, based in North America.

Centurion and Plaid: The safest way to share your financial information and automate the exchange of information.

Connect your accounts with peace of mind 

We use Plaid, which lets you securely connect your financial accounts to Centurion in seconds. This feature saves you the time and effort of manually uploading documents.

Feel secure about your financials 

Plaid is SOC-2 compliant with security practices that meet or exceed industry standards. Plaid keeps your data safe and private with best-in-class encryption protocols like the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS).

Responsible Use of AI

AI will continue to revolutionize the way we work and the world around us, including the practice of accounting. As Centurion continues to integrate AI, responsible use of these tools, as well as privacy and security, will continue to be core to everything we do.

The data you share is only for you

Centurion’s AI runs on closed, protected models. Prompts, responses, and data accessed through Centurion’s AI Assistants remain within Centurion’s isolated boundaries and aren't used to train public or third-party AI tools or LLMs.

Industry-leading security

Centurion and its AI suite operate in secure, industry-leading AWS and Google Cloud cloud-hosted environments, trusted by governments, healthcare, and financial institutions worldwide.

Innovating with integrity

All of Centurion’s products, tools, features, and models adhere to our unwavering privacy, security, and compliance commitments. We conduct regular audits and update our commitments as our service and technology evolve.

Always maintaining the safety and integrity of your financial data

Centurion upholds appropriate security safeguards designed to protect your information from loss, misuse, and unauthorized access or disclosure, and to ensure its confidentiality, integrity, and availability. Our security program accounts for both the sensitivity of the information we process and the current state of technology.

Service Provider Relationships

All third-party services that could potentially impact the security of our information or customer data are reviewed by our platform team. Centurion requires all service providers to agree not to retain, use, or disclose personal information for any purpose other than for the specific purpose of performing the services specified in their agreement with Centurion.

Product Security & Privacy by Design

New features, functionality, and design changes at Centurion go through a security and privacy review process by our teams. Code is tested and is manually peer-reviewed prior to being deployed to production.

Logging and Monitoring

Our production environment implements a centralized logging and monitoring system to track information pertaining to security, monitoring, availability, access, and other metrics about our services.

System Availability & Network Protection

Our infrastructure systems are fault-tolerant, and our operations team works continuously to make Centurion’s platform a highly available service you can rely on. We protect the security of our network through the use of software and tools, such as firewalls and load balancers, and we implement multi-factor authentication for all servers across our various environments, including production.

Data Encryption

All customer data processed by Centurion infrastructure is encrypted in transit (with TLS 1.2) and at rest (with AES-256 encryption) using the latest ciphersuites and protocols. In addition, we enforce full disk encryption on all corporate devices.

Confidentiality and Access Controls

Centurion employees are subject to written confidentiality obligations and are prohibited from accessing customer data unless absolutely necessary. Our security policies include limiting access to systems only where individual roles require it (least privileged).

Personnel Practices

Centurion conducts background checks on employees appropriate for their responsibilities (with more extensive background checks required for key employees who have elevated privileges), provides ongoing privacy and security training to its staff, and requires employees to read and sign confidentiality and non-disclosure agreements as conditions of their employment.

Written Information Security Program

Centurion maintains an information security program for security, availability, processing integrity, confidentiality, and privacy.


Any Questions?

Contact us at support@centurion-business.com