Security

Last updated: October 17, 2025

Our Security Commitment

At S.O.T.A. SYSTEMS, security is not an afterthought—it's foundational to everything we build. We understand that you're entrusting us with your AI workloads, and we take that responsibility seriously.

This page outlines our security practices, infrastructure protections, and how we safeguard your data and API access.

Infrastructure Security

Self-Hosted on Kubernetes

We run our entire infrastructure on self-hosted Kubernetes clusters, giving us complete control over security:

  • Isolated Workloads: All services run in separate namespaces with network policies
  • Pod Security Standards: Enforced at the cluster level with strict admission controls
  • Image Scanning: All container images scanned for vulnerabilities before deployment
  • Secrets Management: Kubernetes secrets encrypted at rest and in transit
  • RBAC: Role-based access control with principle of least privilege

NVIDIA DGX GB300s Infrastructure

  • Physical Security: Data center with 24/7 monitoring, biometric access, and security personnel
  • Hardware Security: Secure boot, TPM 2.0, and hardware-based encryption
  • Network Isolation: Dedicated 100Gbps network with firewalls and VLANs
  • Firmware Updates: Regular security patches and firmware updates

Database Security

We use self-hosted Supabase (PostgreSQL) with:

  • Encryption at Rest: AES-256 encryption for all stored data
  • Encryption in Transit: TLS 1.3 for all database connections
  • Row Level Security (RLS): Fine-grained access control at the database level
  • Automated Backups: Daily encrypted backups with geographic redundancy
  • Network Policies: Database only accessible from authorized services

API Security

Authentication & Authorization

  • API Keys: Cryptographically secure random keys with per-seat scoping
  • JWT Tokens: Short-lived tokens for dashboard and account management
  • OAuth 2.0: Standard authentication for third-party integrations
  • Key Rotation: Support for rotating API keys without downtime

Request Security

  • TLS 1.3: All API requests encrypted end-to-end
  • Certificate Pinning: Available for enhanced security
  • DDoS Protection: Multi-layer protection against volumetric attacks
  • Rate Limiting: Per-seat rate limiting (not per-token) to prevent abuse
  • Input Validation: All inputs sanitized and validated

Request Isolation

  • Each API key operates in isolation
  • No request data shared between users
  • Separate model instances per concurrent stream
  • Memory isolation between inference requests

Data Protection

What We DO NOT Store

This is critical: We do not log, store, or retain your API request content.

  • Prompts: Your input prompts are never logged or stored
  • Completions: Generated outputs are never retained after delivery
  • Context: Conversation history is not stored on our servers
  • Model Training: Your data is never used to train or fine-tune models

What We DO Store

We only collect minimal metadata for service operation:

  • Request timestamps and response times (for monitoring)
  • Model IDs and endpoint types (for routing)
  • HTTP status codes (for debugging)
  • Aggregate usage per API key (for billing)

All metadata is encrypted at rest and automatically purged after 90 days.

In-Transit Data

  • TLS 1.3 encryption with perfect forward secrecy
  • Strong cipher suites (AES-256-GCM)
  • HSTS headers to prevent protocol downgrade attacks
  • Certificate transparency logging

Monitoring & Incident Response

24/7 Security Monitoring

  • Intrusion Detection: Real-time monitoring for suspicious activity
  • Log Aggregation: Centralized logging with anomaly detection
  • Alerting: Automated alerts for security events
  • SIEM: Security Information and Event Management system

Incident Response Plan

  • Documented incident response procedures
  • On-call security team 24/7
  • Defined escalation paths and communication protocols
  • Post-incident analysis and transparency reports

Incident Communication

In the event of a security incident, we commit to:

  • Notify affected users within 72 hours of discovery
  • Provide transparent incident reports on our status page
  • Share root cause analysis and remediation steps
  • Update our blog with lessons learned

Access Controls

Internal Access

  • Least Privilege: Team members only have access to systems they need
  • MFA Required: Multi-factor authentication mandatory for all staff
  • Audit Logs: All administrative actions logged and reviewed
  • Background Checks: Security clearances for personnel with infrastructure access

Customer Access

  • Account dashboard with 2FA support
  • Per-seat API key management
  • Session management and device tracking
  • Audit logs of account activity

Compliance & Certifications

Current Compliance

  • GDPR: European data protection compliance
  • CCPA: California Consumer Privacy Act compliance
  • SOC 2 Type II: In progress (target: Q2 2026)

Planned Certifications

  • SOC 2 Type II audit (Q2 2026)
  • ISO 27001 certification (2026)
  • HIPAA compliance option for healthcare customers (2026)

Vulnerability Management

Proactive Security

  • Regular penetration testing by third-party security firms
  • Automated vulnerability scanning of all services
  • Dependency monitoring and automated updates
  • Security code reviews for all changes

Responsible Disclosure

We welcome security researchers to report vulnerabilities responsibly:

  • Email: security@sota.systems
  • PGP Key: Available on request
  • Response Time: Initial response within 24 hours
  • Bug Bounty: Program launching Q1 2026

What to Report

  • Authentication or authorization bypass
  • Remote code execution vulnerabilities
  • SQL injection or other injection attacks
  • Cross-site scripting (XSS) vulnerabilities
  • Data exposure or leakage
  • Any security issue that could impact our users

Disaster Recovery & Business Continuity

Backup Strategy

  • Frequency: Continuous replication + daily snapshots
  • Retention: 30-day retention for point-in-time recovery
  • Encryption: All backups encrypted with unique keys
  • Geographic Redundancy: Backups stored in multiple regions
  • Testing: Monthly backup restoration tests

High Availability

  • Multi-node Kubernetes clusters with automatic failover
  • Load balancing across multiple inference servers
  • Database replication with automatic failover
  • Geographic distribution for disaster recovery

Third-Party Security

Vendor Management

  • All third-party vendors undergo security assessment
  • Data processing agreements (DPAs) with all vendors
  • Regular vendor security reviews
  • Minimal third-party dependencies

Current Vendors

  • Payment Processing: Stripe (PCI DSS Level 1)
  • Email Delivery: AWS SES (SOC 2 compliant)
  • Infrastructure: Self-hosted on our own hardware

Security Best Practices for Users

Protecting Your API Keys

  • Never commit API keys to version control
  • Use environment variables for key storage
  • Rotate keys regularly (we support zero-downtime rotation)
  • Use separate keys for development, staging, and production
  • Monitor key usage for anomalies

Securing Your Applications

  • Implement rate limiting on your application layer
  • Validate and sanitize user inputs before sending to our API
  • Never expose API keys to client-side code
  • Use server-side proxies for API calls from frontends
  • Implement proper error handling that doesn't leak sensitive data

Transparency & Accountability

As part of our commitment to building in public, we:

  • Publish security incident reports on our blog
  • Share our security roadmap and improvements
  • Maintain a public status page for uptime and incidents
  • Welcome questions and feedback on our security practices
  • Conduct regular security audits and share results

Contact Security Team

For security-related questions or to report vulnerabilities:

Please do not publicly disclose security vulnerabilities until we've had a chance to address them.

Security is a Journey

Security is not a destination—it's an ongoing commitment. We continuously improve our practices, learn from the security community, and stay ahead of emerging threats. Your trust is earned through action, not promises.

Building state-of-the-art infrastructure means state-of-the-art security.