Trust Center

Security, compliance, and data handling practices for Corveil.

Last updated

Compliance & Certifications

In Progress

SOC 2 Type I

Preparing for SOC 2 Type I audit. Controls are being documented and validated.

In Progress

Penetration Testing

Scheduling third-party penetration testing engagement.

Planned

SOC 2 Type II

Planned following Type I completion.

Planned

ISO 27001

On roadmap for enterprise compliance requirements.

Active

FIPS 140-2 Aligned Headers

Security headers on all API responses follow FIPS 140-2 guidelines.

Active

Vendor Security Questionnaires

We complete SIG, CAIQ, and custom security questionnaires on request.

Infrastructure

ControlImplementation
HostingAWS (commercial and GovCloud regions). Self-hosted and managed SaaS options available.
ComputeECS Fargate with auto-scaling. No persistent host access. Containers rebuilt on every deployment.
Tenant isolationSeparate database per customer. No shared data stores between tenants.
NetworkPrivate subnets. Internal ALB with TLS termination. No public database endpoints.
Infrastructure as CodeTerraform modules. All infrastructure changes are version-controlled and auditable.
Air-gapped supportSupports fully disconnected environments with no external network dependencies.

Data Handling

PracticeDetails
Model trainingCustomer data is never used to train models. Corveil is a proxy — data passes through to the provider selected by the customer.
Data residencySelf-hosted customers control data location entirely. Managed SaaS data resides in the region agreed upon at onboarding.
Encryption in transitTLS 1.2+ enforced on all connections.
Encryption at restAES-256 for stored data. API keys are SHA-256 hashed — plaintext keys are not persisted.
LoggingConfigurable audit logging. Organizations control retention duration and level of detail captured.
Data retentionConfigurable per deployment. Self-hosted customers have full control. Managed SaaS follows contractual retention schedules.
PII handlingBuilt-in detection and redaction for SSN, credit cards, email addresses, phone numbers, and IP addresses. Can strip PII before provider call and restore in response.
Secret detectionAutomatic detection and blocking of API keys, tokens, and credentials in outbound requests.

Authentication & Access Control

ControlImplementation
AuthenticationVirtual API keys, OIDC/OAuth 2.0 SSO (Okta, Azure AD, Google), and JWT session management.
Key managementVirtual API keys shield provider credentials. Users never have access to underlying provider keys. Keys support expiration, budgets, and rate limits.
AuthorizationRole-based access control at organization, team, and individual levels. Extends to model access, MCP tools, and individual tool parameters.
Session managementJWT-based sessions with configurable expiration. Admin impersonation is tracked with full audit trail.

Application Security

ControlImplementation
LanguageGo 1.24+. Compiled, statically typed, memory-safe. Single binary with no runtime dependencies.
Security headersHSTS, Content-Security-Policy, X-Frame-Options, X-Content-Type-Options on all responses.
Input validationAll API inputs validated and sanitized. Parameterized database queries. Strict content-type enforcement.
SSRF protectionDNS rebinding defense, private IP blocking, and cloud metadata endpoint protection on all outbound connections.
DependenciesMinimal dependency footprint. Standard library preferred. All dependencies pinned via go.sum.
Content filteringPre-call and post-call guardrails with configurable PII redaction, keyword blocking, regex filtering, and content moderation. Full decision audit trail.

Subprocessors

Third-party services that may process customer data when using Corveil.

ServicePurposeData Processed
AWSInfrastructure hosting (managed SaaS)All application data
OpenRouterLLM provider routingRequest/response content (after guardrail filtering)
AnthropicDirect LLM providerRequest/response content (after guardrail filtering)
Google Cloud (Vertex AI)Direct LLM providerRequest/response content (after guardrail filtering)
AWS BedrockDirect LLM provider (including GovCloud)Request/response content (after guardrail filtering)
PostHogProduct analyticsUsage events, feature adoption metrics

Self-hosted deployments do not route data through Corveil infrastructure. LLM provider subprocessors depend on customer configuration.

Request Security Documentation

Architecture review, data flow diagrams, or completed security questionnaire available on request.

security@corveil.comSchedule a Review