A summary of Signed-I/O's security architecture, compliance certifications, and the third-party subprocessors we engage to deliver the platform.
Every customer receives a fully isolated, dedicated environment. All requests are verified using cryptographic identity before reaching any platform service. The architecture is built on zero trust principles: default deny, explicit identity, and continuous verification.
Signed-I/O does not subcontract AI inference to third parties. All model inference runs within your isolated Customer Environment. Your prompts and outputs never leave your environment and are never used to train shared models.
Audit reports and control mappings are available under NDA via compliance packs (Enterprise required).
Continuous monitoring via signed audit logs and automated alerting. Customers are notified within 72 hours of a confirmed data breach. Responsible disclosure: security@signed-io.com — acknowledgment within 48 hours.
Regular third-party security assessments and penetration tests. Patch SLA: P1 within 30 days, P2 within 60 days, P3 within 90 days.
Signed-I/O engages the following third-party subprocessors to deliver the platform. All are bound by the same data use restrictions described in the Data Processing Addendum. Signed-I/O will provide at least 30 days written notice before adding or replacing a material subprocessor. Customers may object within 15 days.
| Subprocessor | Country | Purpose | Data types |
|---|---|---|---|
| Cloudflare, Inc. | USA | Zero trust edge access, DDoS mitigation, network routing, TLS termination | Network metadata, authentication tokens, request logs |
| Amazon Web Services | USA | Cloud compute, storage, managed services | Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata |
| Microsoft Azure | USA | Cloud compute, storage, managed services | Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata |
| Google Cloud Platform | USA | Cloud compute, storage, managed services | Customer Environment data (encrypted at rest with customer-owned keys), configuration metadata |
A Customer Environment runs on one cloud provider at a time, established at provisioning. Migration to a different provider is an account-level administrative action. Customer data remains encrypted with customer-owned keys throughout.
Security contact: security@signed-io.com