Keystone
by CloudVoro
Security & compliance

What's certified.
What isn't yet.

Plain-language security posture for Keystone. We list every control we run, label whether it's live, in progress, or planned, and call out the gaps so procurement teams don't have to guess.

Effective May 2026 · Last reviewed May 2026

1. Hosting & data residency

LIVEProduction data is hosted in AWS Ireland (eu-west-1, Dublin). No customer data leaves the EU without prior written consent (and we've never asked).

Each Keystone tenant runs in a logically isolated MongoDB database under a single regional cluster. Cross-tenant queries are impossible at the application layer (every query carries a `tenant_id` predicate enforced server-side; see audit-log section below).

2. Encryption

  • LIVEAt rest: AES-256 via AWS KMS-managed keys. Backups encrypted with the same key hierarchy.
  • LIVEIn transit: TLS 1.3 enforced on all public endpoints. HSTS preload-eligible. No TLS 1.0 / 1.1 fallback.
  • LIVEField-level: Sensitive PII fields (customer delivery addresses, contact phones, supplier banking metadata) are encrypted application-side before reaching MongoDB.

3. Access controls

  • LIVEPer-tenant role-based access (super_admin · admin · ops_user · viewer · demo).
  • LIVEBcrypt password hashing (work factor 12) with timing-safe verification.
  • IN PROGRESSMulti-factor authentication — available for super_admin accounts via TOTP; rollout to all roles tracked for Q3 2026.
  • LIVESession tokens are JWTs with 8h idle expiry, signed with a per-deployment HS256 secret.
  • LIVEFailed-login throttling and brute-force IP lockout (10 attempts / 15 min sliding window).

4. Audit trail

LIVEEvery state-changing API call is recorded into an immutable audit log: actor, tenant, action, resource, before/after delta, timestamp, source IP. The log is queryable from the Admin Console and exportable as signed PDF — this is what BRCGS Issue 9 §5.4 evidence looks like in practice. Status transitions on Traceability Events maintain their own status-history sub-log on top.

5. Certification status — the honest list

What we are NOT yet certified to:

  • NOT CERTIFIEDISO/IEC 27001:2022 — alignment programme in progress; we map our controls to Annex A but have no third-party certificate. Marketing copy elsewhere on this site uses phrases like "aligned to ISO/IEC 27001:2022" — that means we follow the control framework, not that we hold the certificate.
  • NOT CERTIFIEDNIS2 (EU Directive 2022/2555) — our customers in scope of NIS2 (essential or important entities) can rely on Keystone's tenant isolation, MFA roadmap and audit-trail controls to support their own obligations. CloudVoro itself is below the NIS2 size threshold; we are building toward readiness rather than holding any NIS2-equivalent attestation.
  • PLANNEDUK Cyber Essentials / Cyber Essentials Plus — on the roadmap. Assessing body (IASME network) and confirmed date will be named here once scoped.
  • NOT CERTIFIEDSOC 2 Type II — not on the 2026 roadmap. We can provide a security questionnaire instead.

What we ARE compliant with today:

  • LIVEGDPR (Regulation (EU) 2016/679) — controller for site visitors, processor for tenant data. See Privacy Policy.
  • LIVEIrish Data Protection Act 2018 — domestic implementation of GDPR.
  • LIVEEU Regulation 178/2002 traceability requirements — Keystone's batch model is designed to evidence Art. 18 obligations end-to-end.

6. Data protection lead & ADPO membership

LIVECloudVoro is below the GDPR Art. 37(1) threshold that mandates a formally designated Data Protection Officer. We operate with a Data Protection Lead (Privacy Contact) who handles subject access requests and supervisory-authority correspondence, reachable at privacy@cloudvoro.com.

Our founder Asif Khan is a member of the Association of Data Protection Officers (ADPO) Ireland, which we maintain for professional development — not as a substitute for a formally appointed DPO. As an owner/director, Asif cannot also serve as CloudVoro's DPO under GDPR Art. 38(6) (conflict of interest). If our processing scale grows past the Art. 37 threshold or a customer's contract requires it, we will appoint an external DPO and disclose that change here.

7. Sub-processors & vendor risk

Limited, named sub-processors with EU-or-equivalent data-protection guarantees. The current list, contact addresses and processing purposes are kept on a dedicated page — /legal/sub-processors. Material changes are emailed to the primary tenant contact 30 days before they take effect, in line with Art. 28(2) GDPR.

8. Vulnerability disclosure

If you believe you've found a security vulnerability in Keystone, please write to security@cloudvoro.com with steps to reproduce. We acknowledge within 2 business days and aim to provide a fix or mitigation timeline within 10 business days. We don't run a paid bounty programme yet — we will name researchers publicly with permission and provide a written acknowledgement letter.

9. Backup & disaster recovery

  • LIVEEncrypted MongoDB Atlas continuous backups, 30-day point-in-time recovery window.
  • LIVERecovery Time Objective (RTO): 4 hours for full-region failure. Recovery Point Objective (RPO): < 1 minute under normal operation, ≤ 15 minutes worst case.
  • IN PROGRESSCross-region warm standby (eu-west-2 London) on the 2026 H2 roadmap.

10. Incident response

We notify the primary tenant contact within 72 hours of confirming a personal-data breach, in line with Art. 33 GDPR. If you're a customer, the named contact for your tenant is recorded in your Master Services Agreement. Generic security notices land in your in-product Admin Console.

11. Customer responsibilities

Security is a shared model. The Customer is responsible for: choosing strong passwords / enabling MFA on super_admin accounts, granting least-privilege access via the Roles screen, keeping the tenant's contact list current, reviewing the audit log on a cadence appropriate to their certification scheme, and notifying us promptly of staff offboarding.

Procurement enquiries

Need a completed security questionnaire (SIG Lite / CAIQ / a retailer's bespoke form)? Email security@cloudvoro.com — typical turnaround 3 business days for a Lite questionnaire, 5–7 for a full one.

Compliance & trust

How we keep your
data and your audits safe.

We are honest about what's certified and what's in progress. Anything marked "in progress" reflects active work towards a recognised standard — never marketing decoration. Privacy queries go to privacy@cloudvoro.com. Sub-processor list at /legal/sub-processors. Full security posture at /site/security.

Live
Hosted in EU / Ireland
Customer data resides on AWS Ireland (eu-west-1) — never leaves the EU.
Live
GDPR · Privacy Contact named
Internal Data Protection Lead handles subject access requests. Owner is ADPO Ireland member.
In progress
NIS2 · building toward readiness
Tenant isolation, audit trails and MFA support customers in NIS2 scope. CloudVoro itself is below the size threshold; not yet certified.
In progress
ISO 27001 · alignment
We map our controls to Annex A but hold no third-party certificate. Formal certification on the 2026 roadmap.
In progress
Cyber Essentials · planned
UK Cyber Essentials assessment is on our roadmap. We will name the assessing body (IASME) and a confirmed date here once scoped.
Live
Encryption · at rest & in transit
TLS 1.3 in transit, industry-standard symmetric ciphers at rest, KMS-managed keys.