Loading...
AES-256-GCM at rest with keyVersion rotation, TLS 1.2+ in transit, an immutable audit log, and every flag cross-linked to a specific regulatory provision across seven frameworks. A Fortune-500 security questionnaire finishes in minutes, not weeks.
keyVersion stamp so keys can be rotated without bricking historical data.Every enterprise security questionnaire probes the same five things. This is how Decision Intel answers each one today, with code paths, not aspirations.
Three regulatory waves are already in force or on the enforcement calendar. Each one asks for exactly the artifact the Decision Provenance Record produces — the reasoning behind a decision, the model lineage that shaped it, and the evidence that it was reviewed, not just generated. We built for this on purpose.
Positioning note for CSOs evaluating us: the Decision Provenance Record is the record your AI-augmented decision-making is supposed to produce anyway under these frameworks. We ship it on every audit so your procurement conversation starts at “here is the control” instead of “we’re working on it.”
Every row in an encrypted column carries an integer keyVersion stamp. Swapping keys is a four-step protocol — no big-bang migration, no data loss, no customer-visible pause.
scripts/rotate-encryption-key.ts. Resumable, batched, idempotent. Dry-run mode available.Every flag the pipeline surfaces carries a regulatory citation. Your GC doesn't take the tool on faith — they walk into the audit committee meeting with the memo, the flags, and the framework sections attached.
What is available today across every plan, and what is unlocked on Enterprise.
The commitment isn't that incidents never happen — it's what you'll hear from us when one does, and in what timeframe.
Transparent processor list with each vendor's certification posture and hosting region. Updated in lock-step with our vendor agreements.
Responsible disclosure is a first-class contract with our users. Report vulnerabilities to security@decision-intel.com — first response within 48 hours, every time. For DPA requests, SOC 2 reports, or a security questionnaire response, reach the same inbox and reference your organisation name.