Trust Center · v13.1 · Gates 2,042 ✓

Hardened by design.
Verified by code.

Security isn't a feature. It's the foundation.

Every release of STRATUS AccessGov passes through 2,042 deterministic security gates before it ships. Every policy decision is hash-chained and locked into immutable storage. Every connection between us and your environment is outbound-only mTLS.

This is what we mean by hardened governance for complex reality.

The Numbers

Hardening, quantified.

Marketing claims aren't trust signals. Numbers your auditor can verify are.

2,042gates
Per release
0ports
Inbound to your network
7years
Forensic retention
99.95%
Multi-AZ uptime target
Data Trust & Privacy

What we touch.
What we never touch.

Most IGA vendors are deliberately vague about what data leaves your environment. We're not.

NIST 800-53 Control Alignment PDF

Technical alignment only. Not certification. Final control satisfaction depends on customer configuration, operating procedures, and shared responsibility.

Download Full Alignment Spec
Here's the complete data residency and control matrix — encryption, retention, who holds the keys.

Data TypeStored by STRATUS?Encrypted?RetentionCustomer Control
Identity MetadataYesAES-256ConfigurableBYO-KMS Integration
Passwords / SecretsNEVERN/AN/APass-through Only
Access DecisionsYesAES-2567-Year OptionImmutable Export
Audit Logs / EvidenceYesSHA-256 chained7-Year OptionS3 Object Lock (Compliance Mode)
Strategic Policy: STRATUS does not store passwords. STRATUS does not execute destructive actions without customer-configured approval policies. The blast radius is yours to define.
What We Do Not Do

The shortest list
on the site.

Every vendor lists what they can do. Almost none list what they refuse to do. These are the design constraints we hold even when a feature request asks us to break one.

Network

We do not open inbound ports.

The Hybrid Connectivity Gateway only dials out. There is no listener. There is no VPN. There is no firewall change request. If you need an architecture that opens an inbound listener to operate, we are not your platform.

Secrets

We do not store passwords or secrets.

Credentials pass through and are not retained. We do not have a vault for your secrets. We integrate with HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault — we never become the source of truth for the secrets themselves.

Identity

We do not replace your IdP.

STRATUS is a governance layer that sits alongside Okta, Entra, Ping, and ForgeRock. Your IdP remains your IdP. We govern access decisions, run certifications, automate offboarding, and produce evidence — we do not authenticate users.

Revoke

We do not execute destructive actions without your policy.

No revoke fires without a customer-configured approval policy. Two-person approval for elevated revokes is the default. The blast radius is yours to define.

What "Reversible Within 24 Hours" Actually Means

Every closed-loop revoke issues a cryptographic rollback receipt — a signed record of what was revoked, the policy decision path, and the prior entitlement state. The receipt is valid for 24 hours after execution.

What the receipt guarantees: the policy state is reversible — STRATUS will not have written a permanent denial record, and the original entitlement request can be re-issued without a new approval cycle.

What it does not guarantee: full automated restoration of state across every target system. Some targets (AD, Okta, AWS IAM) support full programmatic re-grant via the same API path. Others (PeopleSoft revokes that crossed an ERP-side workflow, custom legacy revokes) require manual restoration following the documented receipt. The receipt tells the operator exactly which targets are auto-reversible and which require manual steps — captured in the Evidence Pack for audit.

Evidence Infrastructure · Who owns what

Bucket ownership.
KMS keys. Export.

Buyers performing security review always ask three questions about evidence: who owns the storage, who owns the keys, how do we export. Here are the precise answers.

Bucket Ownership

Recommended: customer-owned S3 bucket in customer's AWS account with Object Lock in Compliance Mode and a 7-year retention policy. STRATUS writes Evidence Packs via cross-account assume-role with write-only permission. You own the evidence end-to-end.

Default for design partners: STRATUS-managed bucket in our us-west-2 account with Object Lock, until customer-owned bucket is provisioned during Days 1–7 of the POC.

KMS Keys

BYO-KMS supported: Evidence Packs encrypted with customer-managed CMK in the customer's KMS. STRATUS holds only assume-role permission to encrypt; never to decrypt outside of customer's audit access path.

Key rotation: automatic annual rotation supported. Historical Evidence Packs remain readable under their prior key version (KMS key-version metadata embedded in each pack).

Evidence Export

PDF (auditor-ready): formatted Evidence Pack with SHA-256 hash, prev_hash, KMS signature, timestamp, actor, decision path, revoke result. Letter-sized, white-background, printable.

JSON (machine-readable): raw event for SIEM ingestion, GRC integration, or external chain verification.

Raw hash + chain proof: minimal artifact for independent third-party verification — verify chain integrity without STRATUS infrastructure.

Proof Artifacts · Under NDA

Don't take it on faith.
Review the artifacts.

Trust-by-vibe is what got the industry into this mess. Each of these artifacts is available to qualified Founding Partner prospects under NDA, requested via the security contact. They are not vapor — they describe what STRATUS actually does today.

Sample 01 · Evidence Pack

Redacted Evidence Pack PDF.

Real revoke event from the lab environment. SHA-256 hash, prev_hash, KMS signature, timestamps, actors, decision path. Customer-identifying fields redacted.

Request PDF →

Sample 02 · Connector Maturity

Full Discover/Certify/Revoke/Evidence sheet.

Per-system breakdown with API approach, auth model, known limitations, and POC-validation status. PDF version of the on-page matrix with footnotes.

Request PDF →

Sample 03 · CI Gate Summary

2,042 deterministic gates — what they actually check.

Category breakdown (SAST, dependency, secrets, IaC, license, behavioral, build provenance), pass/fail telemetry, framework mapping. Sanitized CI screenshot included.

Request PDF →

Sample 04 · Methodology Note

4h17m + 8s — how both numbers were measured.

FY2025 47-enterprise study methodology (sample, sectors, definitions). Lab measurement methodology (AD/Okta/AWS, HR event → sealed evidence). Production-timing caveats.

Request PDF →

Sample 05 · POC Success Criteria

Day-30 acceptance — verbatim.

The specific criteria a Founding Partner POC must meet to count as successful: connectors connected, ghost-account report delivered, simulated revoke validated, first live closed-loop revoke executed, signed Evidence Pack delivered.

Request PDF →

Sample 06 · Federal Evaluation Packet

SSP outline, control mapping, crypto boundaries.

For federal evaluators: NIST 800-53 Rev. 5 control mapping, FIPS 140-3 cryptographic boundary documentation, SSP outline, FedRAMP alignment status (not authorized — alignment).

Request PDF →

All artifacts are requested by email to [email protected] and delivered under NDA within one business day. We do not publish these as public downloads because they contain enough specificity that competitors would scrape them. Founding Partner prospects get them on first scoping call.

Connector Maturity

What's GA. What's Beta.
What's still on the roadmap.

Vaporware is the silent killer of IGA evaluations. Here's exactly where each connector sits — Discover, Certify, Revoke, Evidence — and the production-readiness status next to it.

Target SystemDiscoverCertifyRevokeEvidenceStatus
Active DirectoryYesYesYesYesAVAILABLE NOW
OktaYesYesYesYesAVAILABLE NOW
AWS IAMYesYesYesYesAVAILABLE NOW
WorkdayYesYesPartial / workflowYesAVAILABLE NOW
Entra ID · Azure ADYesYesYesYesPRIVATE BETA
GCP IAM ¹YesYesYesYesAVAILABLE NOW
Salesforce · GitHub · SnowflakeYesYesYesYesAVAILABLE NOW
ServiceNowYesWorkflowWorkflowYesPRIVATE BETA
PeopleSoftYesPartialPartner dependentYesPRIVATE BETA
Oracle EBS · SAPYesPartial — stubPartner dependentYesPRIVATE BETA
Discover: stub validation
RACF / MainframePlannedPlannedPlannedPlannedROADMAP

¹ GCP IAM real-time mode requires GCP credentials configured in the HCG. Heuristic fallback mode is active by default and does not require credentials.

Release Pipeline · 2,042 Deterministic Gates

Hardened, not "AI-powered".

A "secure platform" you can't audit isn't secure. Every commit to STRATUS currently passes through 2,042 deterministic CI gates before it reaches your environment — designed for high-density governance without administrative overhead. The CI gate summary report — including gate categories, pass/fail telemetry, and the specific framework checks each gate enforces — is available under NDA as part of a security review. "Deterministic" matters here: these aren't ML probability calls, they're code rules with binary pass/fail outcomes auditors can read.

Code · Static Analysis

SAST, SCA, secret scan, license check.

Every commit is scanned for known vulnerabilities, dependency CVEs, leaked credentials, and licensing issues. Build fails on critical findings — no human override available.

  • SAST scans (Semgrep, CodeQL) — 600+ rules
  • Dependency CVE scan against NVD + GitHub Advisory DB
  • Secret scan with TruffleHog + Gitleaks
  • License compatibility verification
Container · Runtime

Image hardening, signature, SBOM.

Every container is scanned, signed, and shipped with a software bill of materials. No unsigned images reach production.

  • Trivy + Grype image vulnerability scans
  • Sigstore / cosign image signing
  • SBOM generation (CycloneDX + SPDX) per build
  • Minimal JRE base image, non-root runtime
Infrastructure · IaC

Terraform validated, drift-detected.

All cloud infrastructure is defined as code, scanned for misconfigurations, and continuously validated against drift.

  • Checkov + tfsec policy scans on every plan
  • OPA / Rego enforcement at apply time
  • Drift detection on 15-minute intervals
  • Encryption-at-rest enforced via SCP guardrails
Runtime · Production

Continuous control verification.

The gates don't stop at deploy. Every running pod is continuously verified against the security baseline.

  • Falco runtime detection + custom rule set
  • OPA admission controllers on every K8s API call
  • NetworkPolicies enforced — default deny, explicit allow
  • Pod Security Standards: restricted profile, no exceptions
The Evidence Artifact

What an auditor actually receives.

When the auditor asks "prove the revoke happened" — this is the document that lands in their inbox. SHA-256 hash chain, S3 Object Lock storage, NIST 800-53 mapping, and a redacted sample available for download below.

Compliance Posture · Honest

Aligned with the
frameworks that matter.

We're a small team building toward enterprise readiness. Below is exactly where we are across each major framework — including the ones we don't have yet. Your procurement team will thank us for the candor.

SOC 2 Type II
In progress
Audit underway · target Q3 2026
ISO 27001
In progress
Controls mapped · audit Q4 2026
HIPAA
Aligned
BAA available · technical safeguards verified
CJIS
Control mapping
Supported control set documented
FedRAMP
Aligned · not Authorized
Architecture meets Moderate baseline · ATO pursuit pending Founding Partner govt customer
NIST 800-53
Aligned
AC-2, AC-3, AC-6, AU-2 control mapping in product
Section 508 / VPAT
In preparation
Target: full VPAT 2.5 by Q4 2026
WCAG 2.2 AA
Targeted
Color contrast, keyboard nav, focus management

Important distinction: "FedRAMP-Aligned" means our infrastructure meets the Moderate baseline controls. "FedRAMP Authorized" means an ATO has been issued. We are aligned. We are not authorized. If FedRAMP Moderate ATO is required for your year-one purchase, that's an honest signal that we're not the year-one platform.

Vulnerability Disclosure

Find a bug?
We want to hear about it.

If you've found a security issue in STRATUS AccessGov, we'd rather hear it from you than read about it later. Here's how the program works.

Scope

Production STRATUS AccessGov instances, the Hybrid Connector Gateway, our public APIs, and stratusaccessgov.com. Out of scope: social engineering, physical attacks, denial of service.

Safe Harbor

Good-faith research conducted under this program is authorized. We won't pursue legal action against researchers who follow the program rules and disclose responsibly.

Response SLA

We acknowledge within 24 hours, triage within 72 hours, and target patch release within 30 days for high-severity findings. Critical findings get same-day attention.

Encrypted disclosure: [email protected] · PGP key on request · Full disclosure policy →

Want to verify any of this?

Run the 30-Day Proof of Revoke. Connect your real HR + identity + one or two target systems through the HCG. Watch ghost access surface, evidence packs seal, connectors dial out — closed-loop revoke executed by Day 30 or you walk.

Plan a 30-Day Proof of Revoke See the comparison

Due Diligence Room

Everything your security review needs.

Compliance documentation, architecture evidence, legal agreements, and security artifacts — in one place. Status reflects what is available today, what requires a signed NDA, and what is on the roadmap.

Compliance and control alignment
NIST 800-53 Rev. 5 Control Alignment
Technical alignment only. Not certification.
Available View →
HIPAA § 164.308 Alignment Map
Healthcare vertical. BAA available on request.
Available View →
FedRAMP-Aligned Capability Summary
Alignment only. Not authorized.
Available View →
SOC 2 Type II Roadmap
Target Q4 2026. Available to Founding Partners.
Roadmap Request →
VPAT / Section 508 Accessibility
Assessment in progress. FY 2026.
Roadmap Request →
Product and architecture evidence
Sample Evidence Pack
Synthetic. Illustrative of real output.
Available View →
Deployment architecture diagram
Outbound-only HCG. Data flow. Key ownership.
Available View →
Connector Maturity Matrix
Available Now / Private Beta / Roadmap.
Available View →
Sample Release Attestation
Available to Founding Partners during POC.
POC / NDA Request →
2,042 Security Gate Category Report
Full breakdown available during POC scoping.
POC / NDA Request →
Legal and data governance
Subprocessor List
Current as of deploy date.
Available View →
Privacy Policy
Available View →
Terms of Service
Available View →
Data Processing Agreement (DPA)
Mutual DPA available on request.
Available View →
Business Associate Agreement (BAA)
Healthcare customers. Contact founders to request.
On request Request →
Security operations
Responsible Disclosure Policy
Available View →
Encryption and BYO-KMS model
AES-256 at rest. TLS 1.3 in transit. Customer-managed keys.
Available View →
Data retention and deletion policy
Available View →
Penetration test summary
Available under NDA to Founding Partners.
POC / NDA Request →
HCG Outbound-Only Proof
iptables state, Wireshark pcap, signed evidence-pack.json — 0 inbound SYNs, 30 outbound SYNs in controlled test harness.
Under NDA Request →

Documents marked "POC / NDA" are available to Founding Partners during the 30-Day Proof of Revoke or under a signed NDA. Contact [email protected].