Skip to main content

Security

Governance by design.

adapterOS is built with governance as a structural property, not a feature checkbox. This page explains the security and evidence model.

Security summary

  • All processing happens on dedicated hardware inside your facility. No data leaves your premises.
  • Every operation produces a reviewable record: audit logs, signed run receipts, and policy enforcement records.
  • No third-party model training. Your data is never used to train external models or shared with third parties.
  • The system is designed for offline operation with no runtime dependency on external APIs.

Execution

Local and isolated

Dedicated hardware deployed inside your facility. No data leaves your premises. Your IT controls physical and network access. Tenant isolation separates workloads by design.

Access control

Policy-governed

JWT and API key authentication. Role-based access control. Policy packs define operational boundaries and are reviewed with your team before activation.

Evidence

Reviewable operation

Audit logs for every operation. Cryptographically signed run receipts for inference. SBOM artifacts for every deployed component. Designed for your internal review and audit processes.

Compliance alignment

adapterOS is designed for environments with regulatory requirements. The architecture supports evidence generation for frameworks including CMMC, HIPAA, SOC 2, and ITAR.

These describe design alignment, not certification claims. The system produces evidence artifacts that support your compliance workflows. Detailed compliance mapping is available during deployment discussions.

External dependencies

We minimize external service dependencies. For transparency, the following services are used outside the on-premises system:

ServicePurposeData shared
ResendEmail delivery for website inquiriesEmail address only
CloudflareWebsite hosting and CAPTCHA verificationStandard web request data

These services support the marketing website only. The on-premises adapterOS system has no runtime dependency on external services.

Security contact

Report security issues to security@adapteros.com. Include a description of the issue, affected components, and steps to reproduce.

We acknowledge security reports within 2 business days and provide an initial assessment within 5 business days.

Need security documentation for your review process?

We share detailed security and evidence materials during qualified deployment discussions.