Skip to main content
AuditProven

Security at AuditProven

Our Own Compliance Posture

We build compliance tools. We hold ourselves to the same standards we help our clients meet.

Architecture Security

Data Processing Model

AuditProven Shield processes documents in memory. Uploaded files are parsed, analyzed, and discarded after the assessment completes. Document content is never written to persistent storage, never transmitted to third parties, and never used for training or model improvement.

No AI Training on Your Data

AuditProven Shield does not use large language models for content generation. The pipeline is deterministic and template-based. Your documents are never sent to any external AI service. There is no model to train and no training data to protect.

Cryptographic Provenance

Every generated claim carries a SHA-256 hash linking it to its source. The complete provenance chain is sealed with a Merkle root. This is not just a feature — it is an architectural guarantee that no content appears in a report without a traceable origin.

Deterministic Processing

The pipeline produces identical output from identical input across every run. There is no randomness in the system. This means your compliance report is reproducible and verifiable at any time.

Infrastructure Security

Hosting

AuditProven Shield is hosted within the European Union on infrastructure that meets ISO 27001 and SOC 2 Type II requirements. All data remains within EU borders unless the client explicitly requests otherwise.

Encryption

  • Data in transit: TLS 1.3 minimum
  • Data at rest: AES-256 for any assessment reports retained during the plan period
  • Encryption keys: Managed independently per tenant with regular rotation

Access Control

  • Multi-factor authentication required for all accounts
  • Role-based access control with principle of least privilege
  • All administrative actions logged with immutable audit trail
  • Session timeout after 30 minutes of inactivity

Network Security

  • Web application firewall on all public endpoints
  • DDoS mitigation
  • Network segmentation between application, data, and management tiers
  • No direct database access from public networks

Data Handling

What We Store

  • Account information (email, name, organization)
  • Assessment reports for the duration of your plan
  • Provenance records associated with reports
  • Usage logs for billing and support

What We Never Store

  • Uploaded document content after assessment completion
  • Payment card numbers (processed by our payment provider)
  • Passwords in plaintext (bcrypt hashed)

Data Retention

  • Starter plan: 30 days after assessment
  • Professional plan: retained until account cancellation
  • Enterprise plan: per contractual agreement
  • All data deleted within 30 days of account closure

Data Subject Rights

As an EU-based company subject to GDPR, we support all data subject rights: access, rectification, erasure, portability, restriction, and objection. Submit requests to [email protected].

Vulnerability Disclosure

If you discover a security vulnerability in AuditProven Shield, please report it to [email protected]. We commit to acknowledging your report within 24 hours and providing a resolution timeline within 72 hours. We do not pursue legal action against researchers who report in good faith.

Certifications

AuditProven Compliance Systems B.V. is pursuing ISO 27001:2022 certification and SOC 2 Type II attestation. Certification status will be published here upon completion.