Enterprise-Grade Security

    Security is foundational to DecisionLedger AI, not an afterthought. Every layer of the platform is engineered to protect your data, ensure compliance, and give your team confidence that sensitive decisions stay secure.

    SOC 2HIPAAGDPREU AI ActISO 42001

    0+

    RLS-Protected Tables

    0

    PII Types Detected

    0

    SOC 2 Controls

    0

    Safe Harbor IDs

    0-Year

    Audit Retention

    Defense-in-Depth Architecture

    Three layers of security protect your data from perimeter to storage. Every component is hardened, monitored, and encrypted by default.

    1

    Perimeter

    • AWS WAFv2
    • VPC isolation
    • TLS 1.2+
    • DDoS protection
    2

    Application

    • Row-level security
    • RBAC
    • PII scanning
    • Plugin sandbox
    3

    Data

    • AES-256 at rest
    • S3 Object Lock
    • KMS encryption
    • Encrypted backups

    HIPAA Ready

    Enterprise

    HIPAA compliance features are available exclusively on the Enterprise plan.

    • Business Associate Agreement (BAA)
    • PHI Detection — all 18 Safe Harbor identifiers
    • Automated Breach Detection (hourly)
    • MFA required for all users
    • Immutable Audit Trail (7-year retention)
    • Security Risk Assessment (NIST SP 800-30)

    DecisionLedger maintains administrative, physical, and technical safeguards per the HIPAA Security Rule. We execute Business Associate Agreements before any PHI processing, enforce PHI protections in code, and conduct formal Security Risk Assessments per NIST SP 800-30.

    Our automated breach detection runs hourly, monitoring for suspicious patterns — excessive data access, PII spikes, cross-tenant probing, authentication anomalies, and off-hours activity.

    Data Protection

    Your data is isolated, classified, and protected at every layer. Row-level security ensures tenant boundaries are never crossed.

    Row-Level Security

    PostgreSQL RLS on 32+ tables — every query scoped to tenant.

    Tenant Isolation

    Full logical isolation at database, storage, and compute layers.

    PII Scanning

    Automated detection and classification on every model input.

    Data Classification

    4-tier sensitivity: public, internal, confidential, restricted.

    Encrypted Backups

    AES-256 daily backups with cross-region replication and PITR.

    Access Control

    Fine-grained identity and access management. Control exactly who can see, do, and approve across every resource.

    MFA Required

    TOTP multi-factor authentication is enforced for every user account — no exceptions, no opt-out. Combined with SSO/SAML 2.0 integration for enterprise identity providers.

    Role-Based Access Control

    Multi-tier RBAC defines exactly who can view, create, approve, export, or administer across every resource. Session management with configurable timeouts and concurrent session limits.

    API Key Scoping

    API keys can be scoped to specific resources, operations, and IP ranges. Keys support rotation schedules with zero-downtime rollover and full audit trail of usage.

    Compliance Frameworks

    SOC 2 Type IIGDPRCCPAEU AI ActNYC LL144EEOCISO 42001HIPAA (Enterprise)

    SOC 2 Trust Service Assessment

    Controls assessed against all five AICPA SOC 2 Type II trust service categories.

    CriterionDescriptionStatus
    CC1–CC3
    Control Environment, Communication & Risk Assessment

    Formal security policy, 18 compliance documents, enterprise + AI risk registers

    Pass
    CC4
    Monitoring Activities

    9 CloudWatch alarms, multi-region CloudTrail with log validation, immutable S3 audit logs

    Pass
    CC5
    Control Activities

    WAFv2, row-level security (32+ tables), plugin sandbox, Ed25519 signing, CI/CD security scanning

    Pass
    CC6
    Logical & Physical Access

    Cognito MFA, IAM least-privilege, RBAC, quarterly access reviews, provisioning procedures

    Pass
    CC7
    System Operations

    ECS Fargate, ALB + container health checks, deployment circuit breaker, SNS alerting

    Pass
    CC8
    Change Management

    Branch protection, PR approval, CI/CD gates: ruff, pytest, pip-audit, npm audit, bandit, Trivy

    Pass
    CC9
    Risk Mitigation

    Incident response plan, disaster recovery plan, business continuity plan

    Pass
    A1
    Availability

    Auto-scaling (2–6 tasks), RDS PITR (7-day), DR plan with 4-hour RTO, quarterly DR testing

    Pass
    PI1
    Processing Integrity

    JSON Schema validation, PII scanner (block mode), plugin sandbox (256MB / 30s timeout)

    Pass
    C1
    Confidentiality

    3-tier data classification, S3 lifecycle (Glacier at 90d), tenant offboarding procedures

    Pass
    P1
    Privacy

    Published privacy policy, PII scanner, encrypted sessions, right-to-erasure (30-day SLA)

    Pass

    Internal management self-assessment as of March 2026. Formal SOC 2 Type II audit engagement in progress.

    Model Integrity & Trust Chain

    Patent Pending

    Every decision model is cryptographically signed, hash-verified, and enforced at runtime. Tampered or unsigned models never execute.

    Sign

    Ed25519 cryptographic signing binds code, metadata, and signer identity.

    Hash

    SHA-256 integrity hashes computed for every model artifact file.

    Verify

    On each load, platform re-hashes and compares — tampering detected instantly.

    Enforce

    Unsigned or hash-mismatched models are rejected at runtime. No exceptions.

    Audit & Monitoring

    Continuous monitoring, proactive alerting, and immutable audit records. Know what happened, when, and why.

    Monitoring Coverage (%)

    CloudWatch Alerting — 5 critical alarms with SNS escalation

    Immutable S3 Storage — Object Lock compliance, admin-proof retention

    Audit Log Export — JSON/CSV for SIEM ingestion and compliance reporting

    Real-time anomaly detection identifies unusual access patterns, data exfiltration attempts, and privilege escalation.

    Confidentiality Architecture

    Purpose-built for organizations where data confidentiality is not optional — including legal teams that need privilege-aware processing.

    AWS Bedrock VPC Isolation

    All AI inference within your VPC via Bedrock. No data leaves the AWS cloud boundary.

    Row-Level Tenant Isolation

    PostgreSQL RLS on 39+ tables. Every query scoped to the requesting tenant.

    Zero-Retention Mode

    Inputs/outputs computed in memory, never persisted. Only audit metadata stored.

    Privilege Designation

    Attorney-client privilege with cryptographic attestation chains for litigation support.

    Integrity Chain

    SHA-256 hash chain for every lifecycle transition. Tamper-evident audit trail.

    Data Boundary Enforcement

    Patent Pending

    Per-artifact-class encryption and multi-strategy redaction at the execution runtime.

    Security questions? Let's talk.

    Our team is ready to walk through our security architecture, share compliance documentation, and answer any questions your security team may have.