Enterprise-Grade Security Architecture
Zero-trust by design. Every layer — from DNS ingress to database partition — enforces isolation, encryption, and auditability. Built to satisfy the most demanding CISOs in oil & gas, government, and critical infrastructure.
AES-256
Encryption standard
TLS 1.3
Transport security
Ed25519
Audit log signatures
7-Year
Audit log retention
Architecture Overview
Seismic Swift AI runs on a zero-trust network model. Every request is authenticated and authorised at every layer — there is no implicit trust based on network location.
Request path — ingress to storage
Zero-trust means our corporate VPN compromise cannot reach production. Every service call requires a valid JWT, passes through service-mesh mTLS, and is authorised against the RBAC policy engine before any data is touched.
Encryption at Rest
All data at rest is encrypted with AES-256. Customers on the Enterprise plan control their own encryption keys via Azure Key Vault — we never have access to plaintext.
Per-workspace envelope encryption means a compromise of one tenant's DEK does not expose any other tenant's data. Key material is never written to disk in plaintext.
Encryption in Transit
All data in transit uses TLS 1.3 minimum. TLS 1.0 and 1.1 are disabled at the edge. Strict Transport Security is enforced with a one-year HSTS policy preloaded into browsers.
Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadContent-Security-Policy: strict-dynamic, no unsafe-inlineCross-Origin-Opener-Policy: same-originCross-Origin-Resource-Policy: same-originX-Frame-Options: DENYX-Content-Type-Options: nosniffPermissions-Policy: camera=(), microphone=(), geolocation=()
X-Content-SHA256 header: client-computed Web Crypto SHA-256 verified server-side before processing; 422 on mismatchTenant Isolation
Seismic Swift AI is a true multi-tenant platform built on defence-in-depth isolation. Tenant data is segregated at every layer — database, network, ML pipeline, and audit log. Cross-tenant data access is architecturally impossible.
- Database partition-key isolation: every document is partitioned by
tenant_id. Queries without a matching partition key return zero results by design, not by policy check. - JWT claim enforcement: every API request validates the
tidclaim against the requested resource. IDOR attempts are blocked and logged asViolationType.MISMATCH. - Unicode homoglyph detection: tenant IDs are normalised via Unicode UAX #15 NFC before comparison. Cyrillic/Greek/fullwidth confusables are mapped to ASCII canonical form (TR39 §4). Bidi override characters (11 codepoints) and zero-width characters (5 codepoints) are rejected.
- Enumeration probe detection: a sliding-window detector (60 s window, 5-attempt threshold) identifies and blocks tenant-ID enumeration attacks, logging them as
ViolationType.ENUMERATION_PROBE. - Kubernetes NetworkPolicy: each service is labelled with its tenant context. NetworkPolicy objects enforce default-deny; ML worker pods handling one tenant's data cannot establish TCP connections to another tenant's namespace.
- RBAC96 (Sandhu 1996): permission resolution enforces tenant scope before role scope. A super_admin of tenant A cannot read tenant B's data even with elevated permissions.
We commissioned a penetration test specifically targeting tenant cross-contamination. No cross-tenant data access was achievable. Full report available under NDA.
Authentication & SSO
Seismic Swift AI delegates authentication to your identity provider. We support every major enterprise SSO protocol and never store passwords.
Supported identity providers
Audit Trail
Every state-changing operation produces an immutable, cryptographically-linked audit record. The chain is designed to make undetected tampering computationally infeasible.
verify_integrity() walks the full chain, recomputes hashes, and checks signatures. Returns ChainVerificationResult with broken_records, tampered_signatures, and non_monotonic_timestamps tuples.An attacker who gains write access to Cosmos DB and recomputes forward hashes will still be caught: Ed25519 signatures over the original records will not match the recomputed chain. This two-layer defence (hash chain + signatures) is the same model used by Certificate Transparency logs (RFC 6962).
Dual-Control Approval
High-risk operations require a second authorised approver — no single person can unilaterally escalate privileges, increase quotas, or assign admin roles.
Dual-control makes Seismic Swift AI safe to use in environments with strict separation of duties: no engineer on call can grant themselves elevated access without a second authorised administrator approving the request.
Data Residency
Enterprise customers choose a primary region. All data — blobs, database records, event streams, and backups — is guaranteed to remain within that region. Cross-region replication is opt-in and always within the same geographic zone.
East US
Virginia, USA
Default for North American customers
West Europe
Netherlands
Default for EU customers (GDPR primary)
Brazil South
São Paulo, Brazil
Brazil LGPD compliance
Southeast Asia
Singapore
APAC customers — PDPA compliant
- Data residency is enforced at the application layer via
DataResidencyViolationError— any write targeting a region that doesn't match the tenant's configured residency raises an exception and is logged. - Azure Policy denies resource creation in non-approved regions at the subscription level — a defence-in-depth safeguard below the application layer.
- Backup data replicates to a secondary region within the same continent only (East US ↔ West US 2; West Europe ↔ North Europe; etc.).
- EventHub data streams and Cosmos DB change feeds are region-scoped. No cross-region message routing occurs without explicit customer consent.
- Data Processing Addendum (DPA) available on request — specifies region guarantees as contractual obligations, not just best-effort configuration.
Compliance Matrix
Seismic Swift AI maintains a continuously-updated compliance programme. Evidence packages for each framework are available to enterprise customers under NDA.
| Framework | Scope / Key Controls | Status |
|---|---|---|
| SOC 2 Type II | CC6, CC7, CC8, CC9 — Security, Availability, Confidentiality | Implemented |
| ISO 27001:2022 | Annex A controls — Information Security Management System | In Progress |
| NIST SP 800-53 Rev 5 | AC-3(2) Dual Control · AC-6 Least Privilege · AU-9 Audit Protection | Implemented |
| OWASP Top 10 (2021) | A01 Access Control · A02 Cryptographic Failures · A05 Security Misconfiguration | Implemented |
| FedRAMP Moderate | FIPS 140-2 encryption · PIV/CAC authentication · Continuous monitoring | Planned |
| GDPR (EU 2016/679) | Art. 25 Privacy by Design · Art. 32 Security of Processing · Art. 33 Breach Notification 72h | Implemented |
| CCPA | Right to deletion · Data portability · Opt-out of sale | Implemented |
Last updated: March 2026. Continuous compliance monitoring via shared/compliance/continuous_monitor.py with automated evidence collection.
Supply Chain Security
Every component — from container base images to Python packages — is cryptographically verified before deployment. We maintain a zero critical CVE policy for production images.
Supply chain attacks (e.g. SolarWinds, Log4Shell) are mitigated by hermetic builds: CI pulls from a private Azure Artifact feed that mirrors approved package versions — no live PyPI/npm traffic during production builds.
Incident Response
Seismic Swift AI maintains a 24/7 on-call rotation with documented SLAs for every severity level. GDPR breach notifications are sent within 72 hours of confirmed discovery.
Active breach, full outage, data exfiltration
Partial outage, SLA breach, tenant data access anomaly
Single service degraded, elevated error rate
Non-customer-facing, no data risk
Penetration Testing
Annual third-party penetration tests are conducted by an accredited security firm. We operate a responsible disclosure programme and reward valid vulnerability reports.
- Vulnerability SLA: Critical (CVSS ≥ 9.0) → 24 h remediation. High (7.0–8.9) → 72 h. Medium (4.0–6.9) → 30 days. Low → 90 days.
- All findings are tracked in a security backlog with severity, CVSS score, affected component, and remediation owner. Evidence of fix is required to close each finding.
- Red team exercises (adversarial simulation) conducted on request for enterprise customers with specific threat models (nation-state, insider threat, supply-chain).
Security Whitepaper
The full 48-page Security Architecture Whitepaper covers our threat model, cryptographic design decisions, compliance evidence package, and third-party audit findings. Available for enterprise evaluations.
NDA required for full pentest report. Whitepaper available without NDA.
Built to the highest industry standards