Major IdPs: Okta, Azure AD, Keycloak, Google Workspace. Just-in-time provisioning supported.
Zero-trust by architecture.
Quanterios is built on a zero-trust architecture with cryptographic service identity, region-pinned data planes, and ISO 27001-aligned operational controls. Every claim below is either evidenced in our internal SOC 2 readiness package or verifiable in the product itself.
Least-privilege defaults. Granular role-to-resource mapping. Customer-overridable.
Enforced on all admin paths. WebAuthn and TOTP supported for end users.
Every role change, every elevation, every override logged with the requester's identity.
ML-KEM-768 hybrid available. We eat our own dog food on the agility surface.
Per-tenant data keys, KMS in region. No cross-tenant queries, ever.
All customer data region-pinned at write time. Frankfurt, Dublin, Zurich.
Lifecycle-controlled. Customer-controlled retention windows.
Private VPC, no public ingress to control plane. Cryptographic service identity between services.
Service-to-service mTLS using internal PKI rotated automatically.
Edge-layer protections at Cloudflare; DDoS mitigated at network and application layers.
CIS-aligned base images, minimal attack surface, runtime allow-listing.
Continuous scanning across containers, dependencies, infrastructure. CVE patching SLA per severity tier.
Annually + on major release. Third-party tester. Reports available on request under DPA.
24×5 on-call rotation. Documented runbooks. Customer notification SLA per severity.
Internal alignment in progress. SOC 2 Type 1 in scope for the next reporting period.
Need our security package?
Email trust@quanterios.com for the security questionnaire, DPA template, and pen-test summary.