StellarBase
Docs Security & Compliance Overview
Security & Compliance

Security Overview

Security architecture, engineered in from the start. Encryption at every layer, zero-trust access, full audit trail, PII anonymization, EU data sovereignty. Built to satisfy regulators before you're asked.

The pillars

PillarWhat it coversDocs
Identity & RBACWho can do what, down to individual documentsAuth & RBAC
Zero-TrustNothing trusted by default — every request verifiedZero-Trust
EncryptionIn transit (TLS 1.3), at rest (AES-256), in useEncryption
AnonymizationPII replaced with reversible tokens before leaving perimeterAnonymization
Audit LogEvery action immutably logged, exportableAudit Log
GDPR & ComplianceRegulatory frameworks aligned by architectureGDPR & Compliance

What we aim for

Data sovereignty

Your data stays where you put it. EU-hosted by default. Self-hostable for workloads that can’t leave your infrastructure. Air-gappable for classified environments. No transatlantic data transfers unless you explicitly opt in.

Least privilege

Every user, every agent, every tool has the narrowest possible access. Per-Base, per-document, per-action. No “just give admin for now” anti-pattern — our roles are granular enough that you don’t need to.

Deterministic guarantees

Where security matters most, rules run before ML. Dictionary-based anonymization produces 100% coverage of known terms. Allowlists are absolute. RBAC decisions are not probabilistic.

Auditable by default

Every action logged. Every config change attributed. Every approval signed. Export-ready for internal audit, external auditors, regulators, or court proceedings.

Compliance frameworks

We align with or certify to:

FrameworkStatus
GDPRCore. DPA template in every contract.
EU Data ActAligned — data portability first-class
DORAAligned — operational resilience requirements met
ISO 27001In progress
SOC 2 Type IIIn progress (Q3 2026)
IEC 62443Industrial control systems — guidance aligned
NIS2Critical infrastructure aligned
HIPAA-equivalentFor US healthcare partners on request

Breach & incident policy

  • Contractual breach notification within 24 hours
  • Public incident log with post-mortems
  • Bug bounty programme for security researchers
  • Penetration test reports available on request (under NDA)

Security review resources

Everything your CISO / DPO needs, available on request:

  • Security architecture document
  • Penetration test reports (latest + historical)
  • DPA / SCC templates
  • SOC 2 scope (once certified)
  • Data flow diagrams
  • Subprocessor list
  • Incident response playbooks

Related