Security Stance Summary
This summary describes the control environment of the platform as operated for enterprise clients. It is provided for security review and procurement evaluation.
Client data ownership
Client retains full ownership of tenant data.
Control boundaries
The platform provides reporting, classification, and workflow infrastructure; it does not perform custody or statutory accounting functions.
Change management
Structural changes are versioned and historical states are preserved.
Authentication
OIDC and SAML 2.0 are supported through enterprise identity providers.
Authorisation
Tenant-scoped, role-based, and object-level controls are enforced within the platform.
Least privilege
Services and operators have access limited to required scope only.
Encryption in transit
TLS protects external and internal communications.
Encryption at rest
Tenant data is encrypted using industry-standard mechanisms.
Data residency
Tenant-selected hosting region is enforced at infrastructure level.
Stateless services
The application layer is designed for horizontal scaling and replacement.
Fault isolation
Failures in non-critical services do not compromise core data access.
Authorisation resilience
Authorisation state remains consistent during identity-provider outages.
Change traceability
Reporting and classification changes are historically traceable.
No silent mutation
The platform does not auto-adjust, rebalance, or normalise data without explicit action.
Deterministic computation
Outputs are reproducible from stored inputs.
Identity provider
Enterprise-grade provider for SSO and federation.
Infrastructure
Cloud-based infrastructure with region-specific deployment.
Dependency review
External services are limited to necessary operational functions.
Technology
Understand how our data architecture and infrastructure support critical operations with security and scale.
Technology