Security & Compliance

Built for the most regulated buyer on earth.

Government data has a long memory and a longer reach. Our security posture is built to a federal-civilian bar from day one — even where the contract is municipal.

Posture

The short version.

Single-tenant by default

One customer, one VPC, one set of keys. No shared anything.

Zero-training guarantee

Your data never trains anyone's foundation model. Contractually.

Customer-managed keys

BYOK in your KMS. Rotate on your schedule. Revoke and we go dark.

Least-privilege everything

Workload identity, ephemeral credentials, no shared service accounts.

Defense-in-depth

Network, identity, application, and data layers — independently controlled.

Verifiable

Continuous control monitoring; evidence on demand.

Frameworks

What we're certified, aligned, or in process against.

FrameworkStatusNotes
SOC 2 Type IIActiveAnnual audit by Big-4. Continuous monitoring.
FedRAMP ModerateIn processJAB sponsor secured. 3PAO engaged.
StateRAMP ModerateActiveReciprocity with several states.
HIPAAAlignedBAA available. Full HIPAA Security Rule controls.
CJISAlignedPersonnel screened, controls mapped.
IRS Pub. 1075AlignedFor agencies handling FTI.
NIST 800-53 Rev. 5AlignedMod baseline. Full SSP available under NDA.
NIST AI RMF 1.0AlignedAI-specific controls; quarterly reviews.
ISO 27001In processStage 2 audit Q3.
Data handling

The promises that matter.

Where it lives

In your tenant. AWS GovCloud (US), Azure Government, or your on-prem cluster. Never in our office.

Where it goes

Nowhere. We don't replicate, exfiltrate, or "telemetry" your case data. Operational metrics are scrubbed and aggregated.

How long

Your retention schedule, enforced by us. Defensible deletion with cryptographic proof.

Who sees it

Your people. Our staff has no read access to your data without a break-glass approved by you.

AI-specific safeguards

Not the generic SOC 2 deck.

No training on you

Frontier provider zero-retention contracts. Open-weight runs offline.

Prompt injection defense

Inputs are sandboxed; tool calls are signed; outputs are linted.

Hallucination control

Citation-required mode. No-citation answer = automatic escalation.

PII minimization

Models see only the spans they need; rest is masked.

Red team

External adversarial testing every release.

Bias audits

Quarterly outcome reports across protected classes.

Identity & access

The boring parts done right.

SSO

SAML 2.0, OIDC. Okta, Entra, Ping, PIV/CAC.

MFA

Phishing-resistant required (FIDO2, PIV).

RBAC

Granular roles, separation of duties enforced.

Just-in-time

Privileged access expires; everything is logged.

Incident response

If something goes wrong.

Detect

24×7 SOC, behavioral analytics, anomaly alerts within minutes.

Contain

Tenant isolation, automatic credential rotation, quarantined snapshots.

Notify

1-hour security contact notification; written within 24 hours where required.

Investigate

Joint forensics. We share what we know as we know it.

Recover

Tested DR runbooks; RTO 4h / RPO 15m by default, lower on request.

Learn

Public post-mortem culture; control changes upstream to all customers.

Procurement

Already on the vehicles you use.

GSA MAS

Multiple Award Schedule, IT Cat 132-51.

NASPO ValuePoint

For state & local cooperatives.

SEWP VI

Reseller available for federal.

OMNIA Partners

For city & county purchasing.

Personnel

The people behind the tenant.

Cleared staff

U.S. persons; Public Trust by default; Secret/TS where workload requires.

Background checks

Annual; criminal, financial, social media on hire.

Training

Quarterly security & AI-safety training. Phishing tested monthly.

FAQ

The questions every CISO asks.

Can I see your SSP?

Yes. Under NDA. Includes full controls inheritance map for your boundary.

What about the foundation-model providers?

We use enterprise contracts with zero data retention and no training. We can run open-weight models inside your boundary if you prefer.

How do you handle vulnerabilities?

Coordinated disclosure, public security.txt, internal SLAs of 24h critical / 7d high.

Do you sub-process?

Yes — narrowly. List published. Material additions notified 30 days in advance.

What's your supply-chain story?

SLSA-3 build provenance, signed artifacts, SBOM per release, dependency pinning.

Send the trust packet to your CISO.

Includes SOC 2 II report, SSP summary, sub-processor list, and architecture diagram.

Request packetArchitecture →