Security & Data Handling

We deploy in your own cloud account, follow industry security best practices, and design every system so your data stays under your control.

SOC 2 best practicesHIPAA-aware architectureGDPR-readyMutual NDA & DPA on request

ForthClover is not currently SOC 2 or ISO 27001 certified. Because every system we build is deployed inside your own cloud account, your existing certifications and security controls apply to the deployment.

Secure Data Flow Architecture

Data Input

  • • TLS 1.3 encryption
  • • Input validation
  • • Rate limiting

Processing

  • • Isolated VPC
  • • No data persistence
  • • Audit logging

Secure Output

  • • Output filtering
  • • PII masking
  • • Access control

All data flows through encrypted channels. No training data or prompts are stored or used for model improvement.

Security Features

SSO & RBAC

  • • SAML 2.0 / OAuth 2.0
  • • Active Directory integration
  • • Role-based permissions
  • • MFA enforcement

Audit & Logging

  • • Complete audit trail
  • • SIEM integration
  • • Real-time monitoring
  • • Compliance reporting

Data Management

  • • Automated retention policies
  • • Right to deletion (GDPR)
  • • Data residency control
  • • Encrypted backups

Environment Isolation

  • • Private VPC/VNet
  • • Network segmentation
  • • Container isolation
  • • Zero-trust architecture

API Security

  • • API key rotation
  • • Rate limiting
  • • DDoS protection
  • • WAF integration

Compliance Support

  • • Mutual NDA & DPA standard
  • • BAA on request for HIPAA work
  • • Vendor security questionnaires
  • • Architecture documentation

Deployment Options

Cloud Deployment

  • AWS, Azure, or GCP
  • Your cloud account
  • Private endpoints
  • Auto-scaling

On-Premise

  • Your data center
  • Air-gapped option
  • Full control
  • No external calls

Hybrid

  • Sensitive data on-prem
  • Compute in cloud
  • VPN connectivity
  • Best of both

Have a Security Questionnaire?

Email hello@forthclover.tech and we'll respond within 1 business day with our standard security overview, NDA, and DPA templates.