Security Overview

Placino's security-first architecture ensures sensitive data never leaves your infrastructure. Our zero-trust model, envelope encryption, policy-driven access controls, and cryptographic audit chain provide defense in depth against unauthorized access and tampering.

Security Model

Zero-Trust Architecture

Every request is validated against authentication credentials and authorization policies. No implicit trust based on network location or previous authentication.

Envelope Encryption

Data is encrypted with data encryption keys (DEKs) derived from bearer tokens. Key envelope allows rotation without re-encrypting data segments.

OPA Policy Engine

Open Policy Agent policies define query authorization rules. Fine-grained access control based on user identity, query shape, and data sensitivity.

Merkle-Chain Audit

All operations are logged to a cryptographically linked audit chain. Hash chain verification detects unauthorized modifications to logs.

Certifications

SOC 2

Type II Certified

ISO 27001

Information Security

HIPAA

BAA Available

GDPR

Compliant DPA

For detailed security documentation, threat model, or to schedule a security review, contact our security team.

Contact Security Team