SOC 2 Type II โ€ข ISO 27001 โ€ข FedRAMP Authorized

Trust, Security & Compliance

Our commitment to privacy, security, compliance, and transparent practicesโ€”backed by NSA-certified technology and rigorous third-party audits

Industry-Leading Certifications

Independently audited and certified to meet the most stringent security and compliance standards

๐Ÿ›ก๏ธ
SOC 2 Type II
Certified
๐ŸŒ
ISO 27001
Certified
๐Ÿ›๏ธ
FedRAMP
Authorized
๐Ÿฅ
HIPAA
Compliant
๐Ÿ”’
GDPR
Compliant
๐Ÿป
CCPA
Compliant
๐Ÿ“ˆ
FINRA
Approved
๐Ÿ’ณ
PCI DSS
Compliant
Defense-in-Depth Architecture

Layered Security by Design

Our platform is built on a five-layer defense-in-depth architecture, ensuring multiple independent security controls protect your AI systems

Security Architecture Diagram

Layer 1: AI Control & Governance

Policy engine validates every AI request and response against your governance rules. Model validation and bias detection ensure compliance.

Layer 2: Real-Time Monitoring

Continuous monitoring of all AI interactions with real-time alerting for policy violations, anomalies, and security threats.

Layer 3: Data Layer Security

AES-256 encryption at rest, TLS 1.3 in transit. All sensitive data is encrypted before it touches disk with key rotation and HSM protection.

Layer 4: Access Controls

Role-based access control (RBAC), multi-factor authentication (MFA), and SSO/SAML integration ensure only authorized users can access the system.

Layer 5: Infrastructure Security

Cloud-native security with network segmentation, DDoS protection, and automated security patching. Deployed in SOC 2 certified data centers.

How We Protect Your AI Interactions

Every AI request flows through our deterministic policy engine, ensuring real-time compliance enforcement

Data Flow Diagram
Privacy First

Your Data, Your Control

We collect only the data required to operate the service and enforce your governance policies. Your data is never used for any other purpose.

๐Ÿšซ

Never Used for Training

Customer data is never used to train AI modelsโ€”yours or anyone else's. Your prompts, responses, and policies remain completely private.

โฑ๏ธ

Configurable Retention

Set your own data retention policies. Export audit logs at any time. Delete data on demand. You control how long we keep your information.

๐Ÿ“‹

Full Audit Trails

Transparent data practices with complete audit trails. Know exactly what data we have and how it's used. Export logs in multiple formats.

๐ŸŒ

Global Privacy Compliance

GDPR, CCPA, PIPEDA, and other privacy regulations built into our platform architecture. Data residency options available.

Privacy Questions?

Our privacy team is here to answer any questions about data handling, retention, or compliance.

privacy@containment.ai โ†’
Security Practices

Continuous Security

Security isn't a featureโ€”it's the foundation of everything we build. Our platform is designed with defense-in-depth principles from the ground up.

๐Ÿ”

Encryption Everywhere

AES-256 encryption at rest, TLS 1.3 in transit. All data is encrypted before it touches disk. Key rotation and HSM protection included.

๐Ÿ”‘

Strong Authentication

SSO/SAML, multi-factor authentication (MFA), and granular role-based access controls (RBAC). Support for hardware security keys.

๐Ÿ’ป

Secure Development

Secure SDLC with automated SAST/DAST scanning, dependency monitoring, and code review requirements. Security training for all engineers.

๐Ÿ”

Regular Audits

Annual SOC 2 Type II audits, quarterly penetration testing, and continuous vulnerability scanning. Third-party security assessments.

๐Ÿ“ก

24/7 Monitoring

Security operations center (SOC) with real-time threat detection and automated incident response. 99.99% uptime SLA.

๐Ÿ›

Vulnerability Management

Continuous vulnerability scanning, automated patching, and a responsible disclosure program. Bug bounty program coming soon.

Security Concerns?

Report security vulnerabilities directly to our security team. We take all reports seriously.

security@containment.ai โ†’

Documentation & Resources

Access our security documentation, compliance reports, and legal agreements

Security White Paper

Detailed technical overview of our security architecture, controls, and practices.

Download PDF

SOC 2 Type II Report

Independent audit report covering security, availability, and confidentiality controls.

Request Report

Compliance FAQ

Answers to frequently asked questions about HIPAA, GDPR, FedRAMP, and other regulations.

View FAQ

Questions About Security or Compliance?

Our security and compliance teams are here to help. Reach out with any questions about our practices, certifications, or how we can meet your specific requirements.

Contact Security Team Contact Compliance Team