Security & Compliance

Self-hosted, audit-ready platform with cryptographic integrity. Transparent compliance status with verifiable receipts.

Certifications & Standards

SOC 2 (in progress)

🏥

HIPAA BAA (available on request)

🔒

GDPR-aligned (DPA available)

🔐

Encryption (AES-256 / TLS 1.3)

Security Architecture

Cryptographic Integrity

  • HMAC-SHA256 signing on all frames
  • Real-time bit-rot detection
  • SHA-256 verification gates at retrieval
  • Quantum-resistant signature prep

Data Protection

  • AES-256-GCM encryption at rest
  • TLS 1.3 for all transport
  • Salted key derivation (Argon2id)
  • Designed to support HSM integration

Access Control

  • Role-based access control (RBAC)
  • Resource-level permissions
  • Audit logging of all operations
  • Immutable audit trail (append-only)

Operational Security

  • Self-hosted with private tenancy
  • Supports certificate pinning configuration
  • Configured for HSTS headers
  • Vulnerability disclosure program

Threat Model & Mitigations

Unauthorized Data Access

All data encrypted at rest. Role-based access controls. Audit logging.

Data Corruption (Bit Rot)

HMAC gates on all frames. Real-time hash verification. Redundancy.

Insider Threats

Immutable audit logs. Resource-level permissions. MFA for console.

Man-in-the-Middle Attacks

Enforced TLS 1.3. Certificate pinning. HSTS headers.

Inference Model Poisoning

Multi-teacher verification. Output validation. Flagged anomalies.

Supply Chain Compromise

Signed releases. Dependency scanning. SBOMs provided.

Regulatory Compliance

SOC 2

Type II audit in progress; mapped controls for security/availability. Reports shared under NDA.

HIPAA

BAA available for Enterprise. PHI encryption, access controls, audit logging. Hosted in HIPAA-aligned regions.

GDPR

DPA available. EU/US data residency options. Data subject rights honored (access, erasure, portability).

CCPA

Consumer rights respected; opt-out mechanisms; subprocessors listed in Trust Center.

Trust Center

Review our security posture, subprocessors, data flow, and disclosure process. Evidence shared under NDA for Enterprise.

Ready for Enterprise?

Contact our team for detailed security assessments, BAAs, and deployment support.

Contact Sales