Trust & Security

Security & Compliance

Enterprise-grade security infrastructure designed to protect sensitive identity data and meet the most stringent compliance requirements.

SOC 2 Type II (On Roadmap)

Controls designed to meet all five Trust Service Criteria. We are actively pursuing SOC 2 Type II certification.

GDPR Compliant

Full compliance with EU General Data Protection Regulation. Standard Contractual Clauses (SCCs) available for international transfers.

NIST 800-53 Aligned

Security and privacy controls aligned to NIST SP 800-53 Rev. 5 control families including AC, AU, IA, IR, SC, and SI.

SOX-Compliant Audit Trails

Immutable, tamper-evident audit logs meeting Sarbanes-Oxley record retention requirements for financial institutions.

Data Security

Encryption

  • At Rest: AES-256 encryption for all stored data including biometric images, documents, and personal information
  • In Transit: TLS 1.3 encryption for all network communications
  • Key Management: Google Cloud KMS with automatic key rotation and hardware security modules (HSMs)
  • Encryption Lifecycle: Cryptographic erasure ensures deleted data is unrecoverable

Access Controls

  • Zero Trust Architecture: Every request is authenticated and authorized
  • Role-Based Access Control (RBAC): Principle of least privilege for all user and system access
  • Multi-Factor Authentication (MFA): Required for all administrative access
  • Session Management: Automatic timeout and session invalidation
  • API Security: OAuth 2.0, JWT tokens, rate limiting, and IP whitelisting

Infrastructure Security

  • Cloud Provider: Google Cloud Platform (SOC 2/3, ISO 27001, PCI DSS Level 1)
  • Network Isolation: VPC isolation, private subnets, and firewall rules
  • DDoS Protection: Google Cloud Armor for distributed denial-of-service mitigation
  • Container Security: Cloud Run with automatic patching and vulnerability scanning
  • Secrets Management: Google Secret Manager for credential storage

Compliance Framework

SOC 2 Type II (On Roadmap)

We are actively pursuing SOC 2 Type II certification. All controls are designed to meet the following Trust Service Criteria:

  • Security: Protection against unauthorized access (physical and logical)
  • Availability: 99.9% uptime target with redundancy and disaster recovery
  • Confidentiality: Sensitive data is protected from unauthorized disclosure
  • Processing Integrity: System processing is complete, valid, accurate, timely, and authorized
  • Privacy: Personal information is collected, used, retained, and disclosed in conformity with commitments

NIST 800-53 Alignment

Our security program aligns with NIST SP 800-53 Rev. 5 control families:

  • Access Control (AC): RBAC, least privilege, session management, MFA
  • Audit & Accountability (AU): Immutable audit logs, automated review, tamper-evident records
  • Identification & Authentication (IA): Strong authentication, SSO/SAML support
  • Incident Response (IR): Documented response plan, 24-hour notification SLA
  • System & Communications Protection (SC): TLS 1.3, AES-256, validated cryptographic modules
  • System & Information Integrity (SI): Vulnerability scanning, patch management, anomaly detection

GDPR Compliance

Our GDPR compliance program includes:

  • Legal Basis: Consent, legitimate interests, legal obligation, and contract performance
  • Data Minimization: Collect only necessary data for identity verification
  • Privacy by Design: Security and privacy built into every system component
  • Data Subject Rights: Automated processes for access, rectification, erasure, and portability requests
  • Data Protection Officer (DPO): Dedicated DPO for privacy oversight
  • Data Transfer: Standard Contractual Clauses (SCCs) for international transfers
  • Breach Notification: 72-hour breach notification process

SOX Compliance

For financial institutions and public companies, we provide:

  • Immutable Audit Trails: Tamper-proof logging of all verification events
  • 7-Year Retention: Compliance with record retention requirements
  • Internal Controls: Segregation of duties and change management processes
  • Audit Reports: Detailed verification logs for internal and external auditors
  • Attestation: Management certification of controls effectiveness

CCPA & US State Privacy Laws

  • California (CCPA/CPRA): Consumer rights for access, deletion, and opt-out
  • Virginia (VCDPA): Comprehensive data protection rights
  • Colorado (CPA): Data privacy requirements
  • Biometric Laws: Illinois BIPA, Texas CUBI, Washington HB 1493 compliance

Industry Alignment

  • NIST CSF: Cybersecurity Framework alignment across Identify, Protect, Detect, Respond, Recover
  • FedRAMP-Ready: Architecture designed to support FedRAMP authorization if required
  • HIPAA: Business Associate Agreement (BAA) available for healthcare customers

Security Monitoring

24/7 Monitoring & Response

  • SIEM: Security Information and Event Management for real-time threat detection
  • Intrusion Detection: Network and host-based IDS/IPS
  • Log Aggregation: Centralized logging with Google Cloud Logging
  • Anomaly Detection: Machine learning-based behavior analysis
  • Incident Response: 24/7 security operations center (SOC)

Vulnerability Management

  • Continuous Scanning: Automated vulnerability scanning of infrastructure and applications
  • Patch Management: Automated security patches within 48 hours of release
  • Penetration Testing: Annual third-party penetration tests and red team exercises
  • Bug Bounty: Responsible disclosure program (coming soon)
  • Dependency Scanning: Automated scanning of third-party libraries (Dependabot, Snyk)

Incident Response

Our incident response plan includes:

  • Detection: Automated alerting and 24/7 monitoring
  • Containment: Immediate isolation of affected systems
  • Investigation: Forensic analysis and root cause determination
  • Remediation: Patching, configuration changes, and security improvements
  • Notification: Customer notification within 24 hours of confirmed breach
  • Post-Mortem: Documented lessons learned and process improvements

Data Privacy

Data Handling Practices

  • Data Minimization: Collect only what's necessary for identity verification
  • Purpose Limitation: Data used only for stated purposes
  • Storage Limitation: Automatic deletion after retention period expires
  • Anonymization: Machine learning training uses anonymized data only
  • No Sale: We never sell, lease, or trade personal data

Biometric Data Protection

  • Explicit Consent: Written consent required before collecting biometric data
  • Specialized Encryption: Biometric templates stored with enhanced encryption
  • Limited Access: Biometric data accessible only to authorized ML systems
  • Retention Policy: Biometric data automatically purged within 24 hours of verification completion
  • State Law Compliance: BIPA (Illinois), CUBI (Texas), Washington HB 1493

Third-Party Vendors

All third-party vendors undergo:

  • Security Assessment: Vendor security questionnaires and audits
  • Data Processing Agreements: GDPR-compliant DPAs with all processors
  • Access Controls: Limited, audited access to customer data
  • Regular Reviews: Annual vendor security reassessment

Business Continuity

High Availability

  • Uptime SLA: 99.9% availability guarantee
  • Multi-Region: Redundant infrastructure across multiple GCP regions
  • Auto-Scaling: Automatic scaling to handle traffic spikes
  • Load Balancing: Global load balancer with health checks

Disaster Recovery

  • Backup Schedule: Hourly incremental, daily full backups
  • Backup Retention: 30-day backup retention with point-in-time recovery
  • Geographic Redundancy: Backups stored in multiple regions
  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 1 hour
  • DR Testing: Quarterly disaster recovery drills

Employee Security

Background Checks

  • All Employees: Criminal background checks and identity verification (using IDChecker AI!)
  • Enhanced Screening: Additional screening for employees with data access
  • Ongoing Monitoring: Continuous background monitoring for security-sensitive roles

Security Training

  • Onboarding: Security and privacy training for all new hires
  • Annual Training: Mandatory annual security awareness training
  • Specialized Training: Role-specific training (developers, security team, support)
  • Phishing Simulations: Quarterly phishing tests and remedial training

Access Management

  • Least Privilege: Employees have minimum access required for their role
  • Quarterly Reviews: Access rights reviewed and recertified quarterly
  • Offboarding: Immediate access revocation upon termination

Responsible AI

Ethical AI Principles

  • Bias Testing: Regular testing for demographic bias in face matching algorithms
  • Transparency: Clear documentation of AI decision-making processes
  • Human Oversight: Human review available for disputed verifications
  • Explainability: Audit logs explain verification decisions

Model Security

  • Adversarial Testing: Testing against deepfakes and presentation attacks
  • Model Versioning: All models versioned and auditable
  • Training Data: Anonymized, diverse datasets with consent

Security Questions?

Our security team is available to answer your questions and provide additional documentation.

Security Team: security@idchecker.ai

Privacy Team: privacy@idchecker.ai

Report Security Issue: security@idchecker.ai (PGP key available)