MinusOneDB logoMinusOneDB
Compliance

Enterprise-Grade Compliance,
Built Into the Architecture

Compliance isn't a feature we bolted on. It's an architectural decision baked into every layer — from single-tenant isolation to data sovereignty by design.

Discuss Your Requirements

Certifications & Compliance

Independently audited. Framework-aligned. Architected for the strictest regulatory environments.

SOC 2 Type II

Independent audit of security controls and data handling practices over time.

Encryption

Data encrypted at rest and in transit. Protected at every stage of the pipeline.

NIST Aligned

SP 800-53 access controls, CUI protection, CSF 2.0 supply chain risk management.

Architecture Security

Security guarantees enforced by architecture, not policy. You can't misconfigure what's structurally impossible.

Isolation

Single-Tenant by Design

Every customer gets their own isolated environment. No noisy-neighbour risk. No shared infrastructure between customers. Your environment is yours alone.

Sovereignty

Data Sovereignty by Architecture

Your data stays on your infrastructure. Not a policy — an architectural guarantee. No third-party cloud dependency. No data ever leaves your environment.

Resilience

Deterministic Rebuild

Any environment can be rebuilt from object store in ~3 hours regardless of data size. Full disaster recovery capability with deterministic, repeatable results.

When your security team asks "where does our data live?", the answer is always "on your infrastructure." When they ask "who else shares this infrastructure?", the answer is always "nobody." These aren't configuration options. They're design guarantees.

Access Controls

Granular, auditable controls at every layer. Know exactly who accessed what, when, and from where.

Role-Based Access Controls

Granular permissions per user and per environment. Define exactly who can read, write, and administer each resource.

Token-Based Authentication

Configurable token expiration policies. Revoke access instantly. No persistent credentials stored in the database layer.

IP-Based Access Control

Restrict access to known IP ranges. Lock down environments to your corporate network, VPN, or specific infrastructure.

Audit Logging

Comprehensive logging of all operations. Full traceability for compliance reporting, forensic analysis, and regulatory audits.

Compliance Frameworks

We didn't bolt compliance onto a database. We built the database so compliance is architectural.

FrameworkRequirementMinusOneDB Compliance
SP 800-53Access controlsRole-based access, token auth, IP restrictions, audit logging
SP 800-172r3CUI protectionData never leaves your infrastructure — architectural guarantee
CSF 2.0Supply chain riskNo third-party cloud dependency. Single-tenant isolation.
NIST PF 1.1Data minimization & AI privacyAudit logging, capacity pricing removes incentive to cache/retain data
NIST AI RMFAI governanceDeterministic query results, verifiable analytics
SOC 2 Type IISecurity controls auditIndependently certified. Report available under NDA.
GDPR

Compliant by Architecture

Data sovereignty means data never leaves customer infrastructure, eliminating cross-border transfer issues entirely. No Schrems II concerns. No data processing agreements with third-party cloud providers needed for the database layer.

Operational

Compliance-Ready Architecture

Audit logging, access controls, and data sovereignty simplify compliance across frameworks. No middleware servers that could become attack surface — just a REST API and JS SDK connecting directly to your environment.

Common Questions

Yes. Our SOC 2 Type II report is available under NDA. Contact us and we'll share it with your security team.
On your infrastructure. We never store customer data on shared systems. Your environment is single-tenant and fully isolated — queries execute where the data lives.
Any environment can be deterministically rebuilt from object store in approximately 3 hours, regardless of data size. This provides full disaster recovery capability with repeatable, verifiable results.
Not yet. Our SOC 2 Type II certification and sovereign architecture significantly simplify future FedRAMP authorisation paths. We're happy to discuss your specific federal compliance requirements.
Contact us to discuss your specific PCI DSS requirements. Our single-tenant architecture and access controls provide a strong foundation for PCI-compliant deployments.