Security & Compliance

Aiqarus was designed from the ground up for regulated industries. Enterprise-grade security is the foundation we built on, not a feature we added.

TRUSTED
Encrypted
Transparent
Audited
Verified

Features

Security Principles

Built for regulated industries

Zero Trust Architecture

Every request is authenticated and authorized. No implicit trust.

Least Privilege

Agents have no capabilities unless explicitly granted.

Defense in Depth

Multiple security layers prevent single points of failure.

Transparency

Security through verifiable design, not hidden implementation.

Continuous Validation

Regular penetration testing, scanning, and compliance audits.

Encryption

AES-256 at rest, TLS 1.3 in transit, additional vault encryption.

Tamper-Proof Audit Trails

SHA-256 hash-chained audit logs with Ed25519 attestation signatures

Format: aiq-trace-v1

Trace #1
Event: GOAL_CREATED
Time: 10:00:00.001
Previous: genesis
Hash: a3f2...
──▶
Trace #2
Event: RUN_STARTED
Time: 10:00:00.542
Previous: a3f2...
Hash: 7b91...
──▶
Trace #3
Event: THINK
Time: 10:00:01.123
Previous: 7b91...
Hash: c8e4...

Ed25519 attestation signature • Chain anchor hash proves provenance

Tamper Detection

Modifying any record breaks the chain. Modifications are mathematically detectable.

Goal & Run Traces

Both Goals and Runs have their own trace chains. VerifyGoalTraceChain() validates goal-level audit.

Ed25519 Attestations

Cryptographic signatures using aiq-trace-v1 format. Chain anchor hashes prove provenance.

Database Immutability

Database triggers prevent UPDATE/DELETE on audit records. Even admins can't tamper.

Data Protection

Encryption

AES-256 At Rest

All data encrypted at the database level

TLS 1.3 In Transit

All connections encrypted with forward secrecy

Credential Vault

Integration credentials with additional encryption layer

Customer Encryption Keys

Enterprise customers can manage their own keys

Multi-Tenant Isolation

Database Isolation

Row-level security policies enforce org separation

Execution Isolation

Agent runs scoped to organization

Network Isolation

Dedicated resources and private endpoints (Enterprise)

Data Residency

US, EU, or customer cloud deployment options

Access Control

Fine-grained role-based access with RBAC and SSO/SAML

RoleDescriptionKey Permissions
OwnerFull organization accessAll permissions including billing, goal:abandon
AdminOrganization administrationManage members, agents, goal:create, goal:activate
DeveloperAgent & goal developmentCreate agents, goals, manage versions
OperatorExecution managementExecute goals, approve decisions, goal:accept_partial
ViewerRead-only accessView agents, goals, runs, traces

SSO/SAML Integration

Connect to your identity provider with just-in-time provisioning and group sync.

Okta, Azure AD, Google Workspace, OneLogin, PingIdentity, and custom SAML 2.0

API Key Security

Scoped API keys with expiration, IP allowlisting, and usage tracking.

SHA-256 hashed storage, read-only options, one-click revocation

Compliance Certifications

SOC 2 Type I

In Progress

Expected Q3 2026

HIPAA

Architecture Ready

BAA available for Enterprise

GDPR

Compliant Architecture

DPA planned

ISO 27001

Planned

Roadmap for 2026

Security Built In

Deploy AI agents with confidence in regulated industries.