Trust and security at KoraSafe

Enterprise-grade security is not an afterthought. It is foundational to everything we build. Every layer of KoraSafe is designed for strict tenant isolation, regulatory compliance, and defense in depth.

Multi-tenant data isolation

Every organization's data is cryptographically separated at the database level. There is no shared state between tenants.

Row-level security (RLS)

PostgreSQL RLS policies enforce that every query is scoped to the authenticated organization. No query can cross tenant boundaries, even in the event of application-layer bugs.

Organization-scoped data

All tables carry an org_id foreign key. API tokens, session tokens, and service accounts are bound to a single organization. Cross-org access is architecturally impossible.

Enterprise authentication

Flexible, standards-based authentication that meets the requirements of regulated enterprises.

Single sign-on (SSO)

SAML 2.0 and OpenID Connect support for enterprise identity providers including Okta, Azure AD, Google Workspace, and OneLogin. Enforce SSO-only access per organization.

Multi-Factor authentication

TOTP-based MFA available for all accounts. Organizations can mandate MFA for every member. Backup codes provided for account recovery.

Role-Based access control

Fine-grained RBAC with predefined roles (Owner, Admin, Analyst, Viewer) and custom role support. Permissions are enforced at the API layer and in the UI.

Session management

Configurable session expiry, automatic idle timeout, and forced re-authentication for sensitive operations. All sessions are logged in the audit trail.

Encryption everywhere

Data is encrypted at every stage of its lifecycle, whether at rest in our databases or in transit between services.

Encryption at rest

All data at rest is encrypted using AES-256. Database volumes, backups, and object storage are encrypted with provider-managed keys. We support customer-managed encryption keys (CMEK) for enterprise plans.

Encryption in transit

All connections use TLS 1.3. Internal service-to-service communication is encrypted. API endpoints enforce HTTPS with HSTS headers and certificate pinning for mobile clients.

Immutable audit trails

Every action taken on the platform is recorded in an append-only, tamper-evident audit log.

Append-Only logging

Audit records are written to an append-only store. No user, including administrators, can modify or delete audit entries. Logs capture the actor, action, resource, timestamp, and IP address.

Full searchability

Filter audit logs by user, action type, resource, date range, or IP. Export logs in JSON or CSV for integration with your SIEM. Retention policies configurable per organization.

Agent isolation

Guardian agents and customer-registered AI agents operate within strict organizational boundaries.

Per-Organization scoping

Each Guardian agent instance is scoped to a single organization. Agent configurations, evaluation results, and monitoring data never leak across tenant boundaries.

Sandboxed execution

Agent evaluations run in isolated execution contexts. No agent can access another organization's data, models, or configuration. Resource limits prevent runaway processes.

Compliance posture

KoraSafe is built to meet the security and compliance expectations of regulated enterprises.

SOC 2 Type II aligned

Our security controls are aligned with the SOC 2 Trust Services Criteria. We maintain continuous monitoring against the Security, Availability, and Confidentiality principles.

GDPR ready

Data processing agreements, data subject access request workflows, right-to-erasure support, and lawful basis documentation are built into the platform. EU data residency available.

EU AI Act prepared

KoraSafe helps customers comply with the EU AI Act and uses the same framework internally. Risk classification, documentation, and human oversight requirements are met by design.

Vendor security reviews

We provide completed SIG Lite questionnaires, penetration test summaries, and architecture documentation to support your vendor due diligence process.

Responsible AI

We use our own governance platform to monitor our own AI agents. The guardians guard themselves.

Self-Governing agents

KoraSafe's Guardian agents (PII Sentinel, Bias Auditor, Hallucination Detector, Cost Watchdog, Drift Monitor, Compliance Checker) are registered in our own AI Registry and monitored continuously.

Transparency reports

We publish internal governance metrics including agent accuracy rates, false positive rates, and intervention counts. Our customers can inspect how our agents behave on their data.

Incident response process

A documented, tested incident response plan ensures rapid detection, containment, and communication.

Detection & triage

Automated alerting on anomalous access patterns, failed authentication spikes, and data exfiltration signals. On-call engineers are paged within 5 minutes of a confirmed alert.

Communication & resolution

Affected customers are notified within 72 hours per GDPR requirements, and sooner for critical incidents. Post-incident reviews are published with root cause analysis and remediation steps.

Runtime protection and operational controls

Beyond infrastructure security, KoraSafe enforces runtime protections that keep the platform reliable and abuse-resistant.

Rate limiting

Every API endpoint is rate-limited per key and per IP. Standard headers (X-RateLimit-Limit, X-RateLimit-Remaining, X-RateLimit-Reset) are returned on every response. Burst-friendly defaults with configurable overrides for enterprise customers.

Severity-based alert routing

Critical findings are routed to Slack DM and email within a 1-hour SLA. High-severity alerts go to team channels with a 24-hour window. Medium and low findings stay in-platform. Configurable per organization and per alert category.

SLA compliance tracking

Every alert tracks first_detected_at, acknowledged_at, and resolved_at. Dedicated SLA compliance endpoint reports breach rates per severity tier. Critical alert banner persists at the top of the platform until resolved.

Security headers

All responses include X-Content-Type-Options (nosniff), X-Frame-Options (DENY), Strict-Transport-Security (HSTS), Content-Security-Policy, and Referrer-Policy. Error responses never leak stack traces, file paths, or database internals.

Status, target, evidence. No aspirational claims.

Every certification and control on the roadmap ships with a status, a target date, and the evidence an auditor can verify. If we do not have it yet, we say so.

ItemStatusTargetEvidence
SOC 2 Type IIn progressReadinessMapped
SOC 2 Type IIPlannedAfter Type INot yet
ISO 27001PlannedAfter SOC 2 IINot yet
ISO 42001 for AIIn progressControlsCatalog
SCIM provisioningIn developmentBetaDesign
WebAuthn for adminsPlannedAfter SCIMTOTP live today

Find a weakness, tell us first

We run a safe-harbor program for good-faith security research. If you find a vulnerability, reach out before you publish and we will work it with you.

Disclosure channel

How to reach us.

  • Email Contact-us@korasafe.ai with "security" in the subject line.
  • We acknowledge within one business day.
  • Safe harbor for good-faith research.
  • PGP key published on the trust portal.

What we will share

Security package, under NDA where applicable.

  • SIG Lite questionnaire.
  • Data processing addendum.
  • Subprocessor list.
  • Data-flow diagrams.
  • Penetration-test summary.
  • Incident response runbook.