Security

Table of Contents

Security by Design

We don’t bolt on security controls to pass audits. We built an architecture that eliminates the attack surface.

The result: Compliance becomes simpler because there’s less to audit.


Self-Sovereign Architecture

PrincipleWhat It Means
No Call-HomeZero telemetry. No usage tracking. No phone-home to external servers.
Air-Gapped ReadyFull functionality without internet connectivity.
Data Never LeavesYour data stays on your infrastructure. Always.
Single Audit ScopeNo third-party cloud providers to investigate.
No Supply Chain RiskMinimal dependencies. Single-binary deployment.

Compliance Made Simpler

Self-sovereign architecture reduces audit complexity across every major framework:

FrameworkWho Needs ItWhy Self-Sovereign Helps
SOC 2 Type IIEnterprise B2BReduced attack surface. Simpler scope. Faster audits.
FedRAMPU.S. GovernmentAgencies prefer isolated deployments. Complete data sovereignty.
HIPAAHealthcareNo external BAAs needed. ePHI never leaves your systems.
PCI DSSFinancial ServicesEncryption keys under your control. No cloud intermediaries.
ISO 27001InternationalFewer external dependencies to document and monitor.
IEC 62443ManufacturingMeets air-gapped security level requirements for industrial control.
GDPR/CCPAData PrivacyNo cross-border transfers. Supports data residency requirements.

Technology Stack

Our security isn’t just policy—it’s built into the technology choices:

ComponentSecurity Benefit
OpenBSDSecurity-focused OS for critical deployments
GoMemory-safe, compiled binaries (no runtime vulnerabilities)
NATS JetStreammTLS encryption, zero-trust messaging
Single BinaryNo dependency chain. No supply chain attacks.

Deployment Options

Choose the security level that matches your requirements:

DeploymentUse CaseSecurity Posture
CloudDevelopment, demosStandard controls
On-PremiseEnterprise, regulated industriesEnhanced isolation
Air-GappedGovernment, critical infrastructureMaximum security

All deployments use the same codebase. No feature compromises for higher security.


Vendor Compliance

NATS JetStream is our only external dependency. Synadia (the company behind NATS) maintains SOC 2 Type I certification.

VendorCertificationCompliance Platform
Synadia (NATS)SOC 2 Type IVanta

One vendor. One audit. That’s the advantage of minimal dependencies.


Ready to Simplify Compliance?

Our architecture does the hard work. Your audits get easier.

Get Started →


Report a Vulnerability

Found a security issue? We take security seriously and appreciate responsible disclosure.

Vulnerability Disclosure Policy →


Questions?

Need to discuss specific compliance requirements?

Contact Us →