Trust, Verified
A security company that doesn't publish its own security posture isn't one.
Architecture
Security by Design
Zero-Knowledge Design
We never access, store, or process your data. Policy decisions happen locally or in isolated tenant environments. Tiresias sees threats - never data.
Encryption
TLS 1.3 for all data in transit. AES-256 encryption for all data at rest. No exceptions, no fallbacks.
Authentication
ES256 JWT capability tokens with short-lived expiry, cryptographic signature verification, and automatic key rotation.
Infrastructure Isolation
Isolated tenant environments with row-level security. Each tenant operates in a cryptographically separated context with no cross-tenant data access.
Compliance
Compliance Goals
Our architecture is built with compliance in mind from day one. Formal certifications are on our roadmap as the platform matures.
GDPR Compliance
ActivePrivacy Policy, DPA, Article 30 Register
SOC 2 Type I
In ProgressSecurity & Availability — targeted Q3 2026
SOC 2 Type II
PlannedSustained Compliance — targeted Q1 2027
ISO 27001
PlannedInformation Security Management — targeted Q3 2026
Practices
How We Operate
Immutable Audit Logging
Every policy decision, token issuance, and agent action is logged to an append-only audit trail. Logs cannot be modified or deleted - even by us.
Automated Anomaly Detection
Behavioral analysis powered by Sigma detection rules continuously monitors agent activity for deviations from established baselines.
Policy-as-Code
All security policies are version-controlled, auditable, and deployed through CI/CD. No manual configuration, no drift, no surprises.
Least Privilege at Every Layer
The principle of least privilege is enforced at every layer - from agent tokens to infrastructure access to internal operations.
Data Governance
Data Processing
Data Processing Agreement
Enterprise customers receive a comprehensive DPA covering GDPR, CCPA, and other applicable privacy frameworks. Available upon request for evaluation.
Data Residency
Customer-controlled data residency. Choose where your policy evaluations and audit logs reside. On-premise deployment available for Enterprise tier.
Sub-processors
We maintain a minimal sub-processor list, published and versioned. Each sub-processor is documented with its purpose and data scope. Customers are notified of changes.
Data Retention
Configurable per tenant. Set retention policies for audit logs, token history, and policy evaluation records. Default retention aligns with industry best practices.
Vulnerability Reporting
Responsible Disclosure
We take security reports seriously and respond within 24 hours. If you believe you have discovered a vulnerability in Tiresias, we encourage you to report it responsibly.
We commit to acknowledging reports within 24 hours and providing a detailed response within 72 hours. We will not pursue legal action against researchers who follow these guidelines.
Questions about our security posture?
We're happy to discuss our architecture, compliance plans, or share additional documentation under NDA.