SOC 2 Type II
In progressIndependent attestation of our security, availability, and confidentiality controls. Type I report under Type II observation window.
Audit-grade evidence. Vendor-neutral governance. Independent system of record.
We treat compliance as a deliverable, not a marketing claim. Below is the current state of each framework, with realistic timelines. Detailed mappings and audit reports are available under NDA in our security package.
Independent attestation of our security, availability, and confidentiality controls. Type I report under Type II observation window.
Administrative, physical, and technical safeguards mapped to HIPAA Security Rule. Business Associate Agreement available.
r2 assessment scoping underway. Control mapping to v11.3 covering NIST CSF, ISO 27001, and HIPAA overlays.
ISMS scope defined. Stage 1 readiness audit planned alongside SOC 2 Type II completion. Annex A control alignment in place.
Platform controls mapped to all four NIST AI RMF functions. Crosswalk document available under NDA in the security package.
Logging, transparency, human oversight, and risk management features support customers deploying high-risk AI systems under Title III.
An AI Bill of Materials (AI BOM) is a signed manifest of every component that makes up an agent: the model and version, the prompts, the tools and their permissions, the datasets, the libraries, the operator identity, and the policies in force at run time.
Without an AI BOM, you cannot answer the simplest audit questions: what model produced this decision, on which prompt, with what tool access, for which user? Every CPL agent ships with one. Every change is a new signed version.
{
"aibom_version": "1.2",
"agent": {
"id": "agt_compliance_sentinel",
"name": "Compliance Sentinel",
"version": "3.4.1",
"package_digest": "sha256:9f2e1c…7a3b"
},
"passport": {
"id": "pp_8a2c91…",
"issuer": "anchor.cpl",
"issued_at": "2026-03-12T14:08:21Z"
},
"models": [
{
"vendor": "anthropic",
"name": "claude-sonnet-4.5",
"role": "primary_reasoning",
"fingerprint": "claude-sonnet-4.5-20260218"
}
],
"prompts": [
{ "id": "pr_intake_v8", "digest": "sha256:c1…" },
{ "id": "pr_summarize_v3","digest": "sha256:b2…" }
],
"tools": [
{ "id": "salesforce_read", "scopes": ["account.read"] },
{ "id": "evidence_writer", "scopes": ["bucket.append"] }
],
"datasets": [
{ "id": "kb_policies_2026q1", "rows": 1284, "pii": "redacted" }
],
"dependencies": [
{ "name": "adk-go", "version": "0.42.0" }
],
"policies": ["pol_hipaa_baseline_v6","pol_pii_redact_v2"],
"signature": {
"algo": "ed25519",
"value": "MEUCIQDk…rA=="
}
}Every agent run produces a signed evidence record: inputs, decision context, tool calls, approvals, model outputs, and the AI BOM in force at the time. Records are append-only, retained per policy, and exportable.
Standard tenancy is multi-tenant on Google Cloud with logical isolation, AES-256 at rest, TLS 1.3 in transit. Enterprise tier adds the controls below.
Customer-managed encryption keys via Google Cloud KMS or external HSM (AWS KMS XKS pattern). Per-tenant key hierarchy. Revocation cuts access to data and evidence.
Region pinning available for US (us-central1, us-east4), EU (europe-west4), and UK (europe-west2). Evidence and memory stay in region; cross-region replication is opt-in only.
Private Service Connect, VPC Service Controls, customer VPN/IPSec. Egress allowlist for tool endpoints. No data plane traffic over the public internet on Enterprise.
Per-tenant encryption keys, per-tenant pgvector schemas, per-tenant signing keys for evidence and AI BOMs. No shared model fine-tunes across tenants.
Redaction at ingest with deterministic tokenization. PII never sent to model providers without an explicit, logged policy decision. Right-to-erasure workflows.
Daily encrypted backups, point-in-time recovery to 7 days standard, 35 days on Enterprise. Multi-region DR with documented RTO/RPO under NDA.
Public documents are linked directly. Documents marked under NDA are bundled in the security package and shared after a brief mutual NDA exchange.
Available under NDA on request once Type II completes (target Q4 2026).
How we collect, process, and retain personal data across the platform.
EU/UK SCCs and UK IDTA. Pre-signed; counter-signed on contract execution.
Architecture, controls, threat model. Includes NIST AI RMF crosswalk.
Annual third-party pentest. Executive summary public, full report under NDA.
RTO/RPO targets, runbooks, DR test cadence and last-test results.
The questions enterprise security teams ask us most often. If yours isn’t here, email security@clearpointlogic.com.
The subprocessors below process customer data on our behalf. We notify customers 30 days before adding or replacing a subprocessor; subscribe to changes in the Trust Center.
Standard tenancy is multi-tenant on Google Cloud with logical isolation, AES-256 at rest, TLS 1.3 in transit. Enterprise customers can pin data to US (us-central1, us-east4), EU (europe-west4), or UK (europe-west2). Evidence and memory stay in region; cross-region replication is opt-in only.
Yes, on Enterprise. We support Google Cloud KMS customer-managed keys, with an external HSM pattern available for customers who require their keys never to leave their own KMS. Each tenant has an independent key hierarchy; revocation cuts access to data and evidence immediately.
Per-tenant encryption keys, per-tenant pgvector schemas in the memory layer, and per-tenant signing keys for evidence and AI BOMs. We do not share model fine-tunes, prompt caches, or retrieval indexes across tenants.
By default, PII is redacted at ingest using deterministic tokenization, and is never sent to model providers without an explicit, logged policy decision. Redaction is configurable per agent and per tool; every send is captured in the evidence record.
We follow a documented IR playbook with on-call rotations, severity-tiered escalation, and customer notification commitments under our DPA. For confirmed security incidents affecting customer data, we notify in writing within 72 hours, with regular updates through resolution and a post-incident report.
Yes — annual third-party penetration test plus continuous internal testing. Executive summary is public; full report is shared under NDA with the security package. We also run a private bug-bounty program for invited researchers.
Every agent run produces a signed evidence record that is retained per your policy and exportable to your evidence system. Customers can replay any past run with the AI BOM in force at the time, which is useful for incident review, regulator requests, and litigation discovery.
Email security@clearpointlogic.com. We acknowledge within 1 business day and triage within 3. Researchers acting in good faith are protected from legal action; full policy and PGP key are provided in our security package.
Our security team responds within one business day. For deeper reviews, schedule a 45-minute walkthrough with our CISO and a platform architect.