Trust Center
Security, privacy, and compliance information
- QTSP digital signatures (eIDAS qualified)
- RFC 3161 timestamping for document integrity
- Environment-based document watermarking
- PII field locking after document issuance
- Secure development lifecycle (SDLC)
- Automated container and code security scanning
- Quality gates enforced before every deployment
- AES-256-GCM authenticated encryption at rest
- TLS 1.3 encryption in transit
- Field-level PII encryption with key versioning and rotation
- Automated malware scanning with quarantine on all uploads
- NIST-compliant password storage (FIPS 140-2)
- Data retention policies (7-year / 1-year)
- Automatic data backup with encryption
- Role-based access control (RBAC)
- TOTP multi-factor authentication with backup codes
- NIST 800-63B brute-force protection (exponential lockout)
- Token revocation on logout and password change
- Session management and timeout
- Comprehensive audit logging
- Right of Access (Art. 15)
- Right to Rectification (Art. 16)
- Right to Erasure (Art. 17)
- Right to Restriction of Processing (Art. 18)
- Right to Data Portability (Art. 20)
- Docker Compose orchestration (staging) with isolated networks; Docker Swarm with overlay networks for production scaling
- Infrastructure-only network (databases inaccessible from public)
- TLS termination via Traefik reverse proxy
- Microservices architecture with health monitoring
- Automated rolling deployments with rollback
- GDPR - Regulation (EU) 2016/679
- eIDAS - Regulation (EU) 910/2014
- ETSI EN 319 Electronic Signature Standards
- UN Human Rights Framework Guidelines
Qualified Signatures
QTSP integration supporting AWS KMS, Azure Key Vault, and qualified trust service providers
RFC 3161 Timestamps
Cryptographic timestamps proving document existence at a specific point in time
Document Integrity
SHA-256 hash chain across entire document lifecycle — from ID document upload through AD issuance and contract signing
SHA-256 Hash Chain
Six-point hash chain from ID document upload through AD issuance to signed contract — any modification breaks the chain
QR Verification Codes
HMAC-SHA256 protected QR codes on every AD document with constant-time comparison to prevent timing attacks
Audit Trail Tables
Five dedicated audit tables tracking registration status, AD lifecycle, contract history, bulk operations, and global actions
Environment Watermarking
Non-production documents always watermarked; production documents are clean and legally binding by default
eSignature
eIDAS-compliant qualified signatures via QTSP, PAdES-B-T format, RFC 3161 timestamping, and ETSI EN 319 conformance
EUDI Wallet
Planned: Accept Person Identification Data (PID) via OpenID4VP and issue DA Particulares as Qualified Electronic Attestations of Attributes (QEAAs)
eDelivery
Planned: AS4 2.0 secure cross-border document delivery with digitally signed acknowledgement of receipt
EBSI
Planned: Verifiable Credentials on European Blockchain Services Infrastructure with Trusted Issuer Registry registration
Detection
Real User Monitoring, audit logging, and service health checks
Response
Rapid incident response with circuit breakers and automated rollback
Communication
Transparent disclosure to affected parties per GDPR Art. 33-34
If you discover a security vulnerability, please report it responsibly. We appreciate your help in keeping our platform and users safe.
Last updated: March 2026 |View License | Terms of Use
Powered byStargue