Legal

Compliance & Security

A summary of Signed-I/O's security architecture, compliance certifications, and the third-party subprocessors we engage to deliver the platform.

Effective date: March 6, 2026

Security architecture

Every customer receives a fully isolated, dedicated environment. All requests are verified using cryptographic identity before reaching any platform service. The architecture is built on zero trust principles: default deny, explicit identity, and continuous verification.

No shared inference

Signed-I/O does not subcontract AI inference to third parties. All model inference runs within your isolated Customer Environment. Your prompts and outputs never leave your environment and are never used to train shared models.

Compliance certifications

Audit reports and control mappings are available under NDA via compliance packs (Enterprise required).

SOC 2 Type II ISO 27001 HIPAA PCI DSS FedRAMP Moderate CJIS

Incident response

Continuous monitoring via signed audit logs and automated alerting. Customers are notified within 72 hours of a confirmed data breach. Responsible disclosure: security@signed-io.com — acknowledgment within 48 hours.

Vulnerability management

Regular third-party security assessments and penetration tests. Patch SLA: P1 within 30 days, P2 within 60 days, P3 within 90 days.

Subprocessors

Signed-I/O engages the following third-party subprocessors to deliver the platform. All are bound by the same data use restrictions described in the Data Processing Addendum. Signed-I/O will provide at least 30 days written notice before adding or replacing a material subprocessor. Customers may object within 15 days.

Subprocessor Country Purpose Data types
Cloudflare, Inc. USA Zero trust edge access, DDoS mitigation, network routing, TLS termination Network metadata, authentication tokens, request logs
Amazon Web Services USA Cloud compute, storage, managed services Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata
Microsoft Azure USA Cloud compute, storage, managed services Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata
Google Cloud Platform USA Cloud compute, storage, managed services Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata

A Customer Environment runs on one cloud provider at a time, established at provisioning. Migration to a different provider is an account-level administrative action. Customer data remains encrypted with customer-owned keys throughout.

Security contact: security@signed-io.com