Aten Security · Trust & Compliance

Security is the product,
not the pitch.

We built a governance product for regulated industries. That means our own security posture has to be auditable, verifiable, and explainable — the same standard we hold your AI agents to.

Every major framework. Runtime-enforced.

These aren't documentation exercises. Thoth's compliance packs enforce each framework's requirements as active runtime policy.

SOC 2 Type II

SOC 2 Type II

Annual third-party audit covering security, availability, and confidentiality controls.

Certified
ISO 42001

ISO 42001

AI management system standard. The ISO framework built specifically for AI governance.

Certified
GDPR

GDPR

Data subject rights, processing records, and controller/processor agreements in place.

Ready
CISA

CISA

Aligned with CISA Secure by Design principles and AI cybersecurity guidance.

Aligned

HIPAA

BAA available. PHI handling controls, minimum-necessary enforcement built into policy packs.

Compliant

EU AI Act

Automated WORM-compliant logging satisfies Article 12 record-keeping requirements.

Art. 12 Ready

AARM

Runtime implementer in the AARM Foundation Technical Working Group. Conformance review in progress.

TWG Member

NIST AI RMF

Human oversight gates, behavioral baselines, and risk measurement aligned to NIST AI RMF.

Aligned

Built for regulated environments.

Enterprise security requirements shaped every architectural decision from day one.

Hash-chained audit log

Every enforcement event is written to a WORM-compliant hash chain. Each record includes the previous record's hash — making insertion, deletion, or tampering cryptographically detectable.

Sub-100ms enforcement path

The local policy evaluation layer runs in <15ms. The MOSES fast-ML tier clears 85% of traffic in <100ms. No action is held pending a network round-trip to an external service.

Fail-open by design

If Thoth is unreachable, your agent runs unblocked. We never become a single point of failure in your production stack. Shadow mode means observation can't block your workloads.

Customer-managed keys

All behavioral telemetry is encrypted at rest using AWS KMS CMKs. Each customer has their own key — we cannot read your agent data without your key.

Zero persistent agent credentials

The Thoth SDK instruments your agent's tool calls. It does not store credentials, API keys, or session tokens. Enforcement happens on the call metadata — not the underlying access.

Tenant isolation

Each enterprise customer runs in an isolated VPC with dedicated compute, storage, and KMS keys. There is no shared data plane between customers.

We govern AI agents.
We hold ourselves to the same standard.

Thoth observes tool call metadata — not content. We never see the payload of a tool call, never store API credentials, and never retain PII from agent responses.

The WORM audit log stores only what's necessary to prove enforcement held: agent identity, tool name, timestamp, decision, and the behavioral score that drove it.

What we collectAgent ID · Tool call name · Timestamp · Enforcement decision · Behavioral score · Evidence bundle
What we never collectTool call payloads · API credentials · PII from tool responses
Data residencyAWS us-west-2 (default) · EU regions available on request
RetentionWORM evidence: 7 years · Behavioral telemetry: configurable (default 90 days)
SubprocessorsAWS (compute/storage) · MongoDB Atlas (governance data) · Azure OpenAI (deep-LLM analysis)
Data deletionFull deletion within 30 days of offboarding. Cryptographic proof of deletion available.

Responsible Disclosure

Found something? Tell us first.

We take security reports seriously and respond within 24 hours. We don't pursue legal action against good-faith security researchers.

security@aten.security →

Penetration Testing

Annual third-party pen tests.

Conducted by an independent firm on a rolling annual schedule. Results are reviewed by our advisory board and incorporated into the roadmap.

Trust Center →

We answer security questionnaires.

Send your vendor security questionnaire to security@aten.security. We respond within 2 business days.

Visit Trust Center