Execution
Local and isolated
Dedicated hardware deployed inside your facility. No data leaves your premises. Your IT controls physical and network access. Tenant isolation separates workloads by design.
Security
adapterOS is built with governance as a structural property, not a feature checkbox. This page explains the security and evidence model.
Execution
Dedicated hardware deployed inside your facility. No data leaves your premises. Your IT controls physical and network access. Tenant isolation separates workloads by design.
Access control
JWT and API key authentication. Role-based access control. Policy packs define operational boundaries and are reviewed with your team before activation.
Evidence
Audit logs for every operation. Cryptographically signed run receipts for inference. SBOM artifacts for every deployed component. Designed for your internal review and audit processes.
adapterOS is designed for environments with regulatory requirements. The architecture supports evidence generation for frameworks including CMMC, HIPAA, SOC 2, and ITAR.
These describe design alignment, not certification claims. The system produces evidence artifacts that support your compliance workflows. Detailed compliance mapping is available during deployment discussions.
We minimize external service dependencies. For transparency, the following services are used outside the on-premises system:
| Service | Purpose | Data shared |
|---|---|---|
| Resend | Email delivery for website inquiries | Email address only |
| Cloudflare | Website hosting and CAPTCHA verification | Standard web request data |
These services support the marketing website only. The on-premises adapterOS system has no runtime dependency on external services.
Report security issues to security@adapteros.com. Include a description of the issue, affected components, and steps to reproduce.
We acknowledge security reports within 2 business days and provide an initial assessment within 5 business days.
We share detailed security and evidence materials during qualified deployment discussions.