Trust & Security
Your code never leaves your control. Adapts is built from the ground up for enterprise data privacy, security, and compliance — because the systems we help you understand are the most sensitive assets you own.
Certifications & standards
SOC 2 Type II
Q2 2026
ISO 27001:2022
Q2 2026
GDPR & CCPA
Via DPA
Eight pillars of enterprise security
Customer-Managed Encryption
You control encryption keys. Full key management with AWS KMS and customer-managed CMKs.
Workflow-Oriented Metadata
Process metadata is strictly separated from customer data with distinct access controls and storage boundaries.
No-Touch Deployments
CI/CD automation eliminates manual production access. Zero human touch on production systems.
Access Transparency
Immutable audit logs for every data interaction. Who accessed what, when, and why.
Data Classification & Segregation
Strict policies separate customer and operational data with distinct access controls.
Multi-Tenant Isolation
Unique encryption boundaries per tenant. Complete isolation ensures no cross-tenant data leakage.
In-Memory Processing
Code is processed in memory and never persisted beyond the analysis window. Zero code retention.
Compliance & Governance
Multi-framework alignment with industry standards. Continuous compliance monitoring and policy enforcement.
Privacy by design
No Data Collection
Customer data is only processed within the customer-controlled environment and is never transferred for training or analytics. Your code stays yours.
Secure by Default
All data encrypted at rest using AWS KMS and in transit using TLS 1.2+. Short-lived credentials via AWS STS ensure minimal exposure windows.
Transparency & Auditability
Immutable, cryptographically signed logs retained per compliance needs. Customer-visible access records provide full accountability.
Data Retention & Deletion
- Self-service project and tenant deletion
- Inactive artifacts purged after 30 days
- Encrypted backups retained 30 days, then securely shredded
- Deletion requests processed within 30 days
Incident Response
- 24/7 on-call rotation for security incidents
- <30-minute incident acknowledgment SLA
- Root cause analysis and notification within 72 hours
- Public postmortems for security events
You're in control
Access & Audit
Real-time audit logs, customer-visible access records, role-based access control (RBAC).
Data Sovereignty
Lock data to specific regions/AWS accounts (Enterprise), exclude data from model fine-tuning, request full data deletion within 30 days.
Security documentation
Available for download. For additional security documentation or a completed vendor security questionnaire, contact security@adapts.ai.
Have a security question?
Our security team is available to discuss your requirements and answer any questions about our security posture.
Contact security@adapts.ai