Przejdź do głównej zawartości
Wersja: najnowsza

Security & Compliance

VaultPAM is designed for regulated environments. Use this section when you need to understand how the product supports security controls, where data lives, and how to answer a compliance questionnaire.

SOC 2 posture

VaultPAM supports common control families through:

  • MFA and step-up MFA for sensitive actions
  • Session recording for user accountability
  • Audit logging for administrative and access events
  • Approval gates on high-risk Safes
  • Network isolation through the connector model

Data residency

  • The current reference architecture uses GCP region eu-west1.
  • Tenant data is split between tenant-scoped PostgreSQL and MinIO object storage.
  • Session metadata, recordings, and audit logs remain associated with the tenant and are retained according to the configured policy.

Audit access

  • Audit records can be reviewed in the console.
  • CSV export is available for downstream review.
  • Retention is policy-driven and should match your internal controls.

Encryption and credential handling

  • Traffic is encrypted in transit with TLS 1.3 or later.
  • Data at rest is protected by AES-256 through the storage layer and GCP-managed keys.
  • Credentials are injected at session time through OpenBao and are not exposed in plaintext to end users.

Compliance scope

VaultPAM is intended to support SOC 2 and ISO 27001 alignment. GDPR processor responsibilities, eIDAS, and NIS2 considerations should be validated against your deployment settings and contractual obligations.

Report a vulnerability

If you have found a security issue in VaultPAM, see our Vulnerability Disclosure Policy.

Need evidence?

Contact your support or customer success channel for compliance questionnaires, architecture notes, and evidence packages.