Security & Trust

Built for the highest-trust healthcare environments.

From sovereign-deployable architecture to SOC 2 Type II, ISO 27001, and HIPAA-by-design — security is foundational, not bolted on.

Certifications & frameworks

The compliance posture.

HIPAA

HIPAA by design

Privacy and Security Rule compliance is architectural. PHI partitioning by tenant. Audit logs on every action. BAA standard with every customer.

SOC 2

SOC 2 Type II

Type II report covering security, availability, processing integrity, confidentiality, and privacy. Available under NDA.

ISO

ISO 27001

Information security management system certified. Annual surveillance audits. Statement of Applicability available under NDA.

Encryption

AES-256 · TLS 1.3

At rest and in transit, with customer-managed keys available for Sovereign deployments.

Government

Sovereign & ATO-ready

Aether One™ Sovereign aligns with FedRAMP requirements and is deployed today inside a CMS Medicare environment.

Vulnerability mgmt

Continuous testing

Static analysis (SonarQube), dependency scanning, third-party penetration tests, bug bounty (planned).

Architectural guarantees

Security as architecture, not policy.

Some controls are policies a vendor asks you to trust. The ones below are guarantees enforced by architecture — auditable in code.

GuaranteeHow it's enforced
No PHI in cross-tenant model trainingData partitioning at the storage layer. Models retrain only on curated, de-identified datasets with explicit, written customer authorization.
Sovereign means sovereignAether One™ Sovereign runs the full agent stack inside customer perimeter, anchored on Genzeon Platforms' patent-protected Knowledge Containment Architecture. No model weights phone home. No telemetry leaks reasoning.
Audit log integrityEvery action logged, timestamped, signed. Reconstructable from on-premise logs alone — no cloud roundtrip required to answer a CMS audit.
Mandatory human review on adverse decisionsArchitectural, not policy. Agent 871 (Non-Affirm Research) routing is hard-coded into every clinical agent's graph.
Threshold cryptography for hybrid deploymentsFor controlled-egress Sovereign, no single domain holds keys to compromise either model integrity or PHI confidentiality (PA-SEC).

Need our SOC 2 report or security questionnaire?

Available under NDA. We'll typically turn around standard questionnaires (HECVAT, CAIQ, SIG) in 5 business days.

Request security artifacts