Security & Compliance
Self-hosted, audit-ready platform with cryptographic integrity. Transparent compliance status with verifiable receipts.
Certifications & Standards
SOC 2 (in progress)
HIPAA BAA (available on request)
GDPR-aligned (DPA available)
Encryption (AES-256 / TLS 1.3)
Security Architecture
Cryptographic Integrity
- HMAC-SHA256 signing on all frames
- Real-time bit-rot detection
- SHA-256 verification gates at retrieval
- Quantum-resistant signature prep
Data Protection
- AES-256-GCM encryption at rest
- TLS 1.3 for all transport
- Salted key derivation (Argon2id)
- Designed to support HSM integration
Access Control
- Role-based access control (RBAC)
- Resource-level permissions
- Audit logging of all operations
- Immutable audit trail (append-only)
Operational Security
- Self-hosted with private tenancy
- Supports certificate pinning configuration
- Configured for HSTS headers
- Vulnerability disclosure program
Threat Model & Mitigations
Unauthorized Data Access
All data encrypted at rest. Role-based access controls. Audit logging.
Data Corruption (Bit Rot)
HMAC gates on all frames. Real-time hash verification. Redundancy.
Insider Threats
Immutable audit logs. Resource-level permissions. MFA for console.
Man-in-the-Middle Attacks
Enforced TLS 1.3. Certificate pinning. HSTS headers.
Inference Model Poisoning
Multi-teacher verification. Output validation. Flagged anomalies.
Supply Chain Compromise
Signed releases. Dependency scanning. SBOMs provided.
Regulatory Compliance
SOC 2
Type II audit in progress; mapped controls for security/availability. Reports shared under NDA.
HIPAA
BAA available for Enterprise. PHI encryption, access controls, audit logging. Hosted in HIPAA-aligned regions.
GDPR
DPA available. EU/US data residency options. Data subject rights honored (access, erasure, portability).
CCPA
Consumer rights respected; opt-out mechanisms; subprocessors listed in Trust Center.
Trust Center
Review our security posture, subprocessors, data flow, and disclosure process. Evidence shared under NDA for Enterprise.
Ready for Enterprise?
Contact our team for detailed security assessments, BAAs, and deployment support.
Contact Sales