Security & Enterprise Controls
Gradaris is a secure, auditable control plane for AI systems — built with enterprise-grade identity, monitoring, and governance controls. We operate outside your data perimeter, processing only governance metadata. Here is exactly how the platform is built, secured, and controlled.
The data perimeter principle
Gradaris never receives, processes, or stores the content your AI agents handle. We receive only cryptographic hashes (SHA-256) of inputs and outputs, timing measurements, and structural telemetry. The data your agents process — customer records, financial data, medical information — remains entirely within your own infrastructure. This is an architectural commitment, not a policy.
Enterprise Controls
Gradaris is built for regulated organisations. Every layer of the platform reflects the security and compliance requirements of enterprise and financial services deployments.
Identity
SAML SSO, role-based access control, and full user lifecycle management. Integrates with Okta, Azure AD, Google Workspace, and any SAML 2.0 provider.
Audit
Complete, tamper-evident event logging for all governance actions, SSO events, assessments, and API calls — queryable and exportable for regulators and auditors.
Monitoring
Automated alerts for governance score changes, control failures, policy violations, and certificate expiry. Delivered via email, webhook, or the platform notification centre.
Integration
REST API and webhook events for all key governance actions. SDK available for Python. No-code integration via Zapier and Make. All API access is authenticated and scoped.
Infrastructure
AWS hosted
All infrastructure runs on Amazon Web Services in a primary US region. Environments are fully segregated with no shared network paths.
Network isolation
Application and database tiers have no direct internet exposure. All inter-service traffic flows through hardened internal network controls.
Database
All governance data stored in a managed relational database with encryption at rest (AES-256). Automated backups and high-availability configuration in production.
TLS 1.3 in transit
All API traffic encrypted with TLS 1.3. HTTPS enforced everywhere — no plaintext connections accepted. HSTS headers set with 1-year max-age.
Authentication & access control
Gradaris uses database-driven session authentication with server-side session management. Sessions are scoped to tenant with per-session API key routing, ensuring that no cross-tenant data access is possible even within a shared infrastructure environment.
Identity & Access Control
Gradaris supports SAML-based Single Sign-On (SSO), enabling secure integration with enterprise identity providers including Okta, Azure AD, Google Workspace, and any SAML 2.0-compatible provider. Access is centrally managed and auditable, aligning with enterprise security and governance requirements.
- SAML SSO integration: Enterprise identity provider connectivity with support for metadata XML and manual configuration. SP metadata available for IdP administrator setup.
- JIT user provisioning: Users are automatically provisioned on first SSO login based on identity provider group membership and configured role mappings.
- SSO enforcement: Administrators can enforce SSO organisation-wide, blocking password-based login for all non-superadmin accounts.
- Break glass access: Time-limited, auditable emergency bypass tokens for recovery when SSO is unavailable. All break glass events are logged.
- SSO audit log: Every login attempt, provisioning event, configuration change, and enforcement action is recorded and queryable by administrators.
- Role-based access control (RBAC): Admin and Member roles, with expanded role definitions on the roadmap.
- API keys: SHA-256 hashed at storage. Scoped to a single tenant. Rotatable at any time without service interruption.
- Elevated administration: Platform-level administrative functions are protected by elevated authentication controls, separate from tenant credentials.
- Session expiry: Sessions expire after a period of inactivity. Forced re-authentication on sensitive operations.
Cryptographic integrity
Every GGS assessment report is cryptographically sealed. The integrity hash covers the full assessment payload — methodology version, all criterion scores, tier weights, and the composite grade. Any post-hoc modification is detectable.
Agent-to-agent (A2A) trust calls are authenticated and every interaction is recorded in an immutable audit chain with full lineage, EU AI Act Article 12 aligned.
Evidence packages can be independently verified by regulators, auditors, or legal counsel using the public Gradaris Verification API — no Gradaris account required for verification.
Vulnerability disclosure
If you discover a potential security vulnerability in the Gradaris platform, please report it responsibly to info@gradaris.com. We will acknowledge receipt within 24 hours and provide a resolution timeline within 5 business days. We do not pursue legal action against good-faith security researchers.
Compliance
Gradaris is designed to support your compliance obligations under EU AI Act Article 12 (logging and monitoring), Article 10 (data governance), and Article 9 (risk management). Formal certifications including SOC 2 Type II and ISO 27001 are on the roadmap. Contact us for current compliance documentation and security questionnaire responses.