Trust Center

Compliance posture · open and verifiable

JIL Sovereign publishes our framework status, encryption posture, and subprocessor list openly so procurement and security teams can complete evaluation before signing an NDA. Auditor-evidence-grade artifacts (signed inventories, vulnerability assessments, IR exercises, third-party reports) are released under NDA on request.

Framework posture

JIL operates under four primary control frameworks. Status as of 2026-04-26; refreshed monthly.

Aligned
HIPAA Security Rule

Technical, administrative, and physical safeguards mapped 100% to 45 CFR 164.308 / 164.310 / 164.312. BAA available with all healthcare engagements.

Self-attested today · third-party validated under SOC 2 Type II + HITRUST i1.
In audit
SOC 2 Type II

All five Trust Services Criteria (CC1-CC9 + Availability + Confidentiality) mapped. Engagement with an AICPA-licensed firm in flight; compressed first-year observation period.

Target completion: Q3 2026 · cannot be self-attested.
In audit
HITRUST i1

CSF v11 i1 control set 98% mapped. Two i1-only gaps in plan (full MDM, Trivy CI scanning). Equivalent-control evidence accepted for single-personnel org.

Target i1 certification: Q3 2026.
Aligned
NIST CSF 2.0

All six functions (GOVERN, IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER) mapped to live controls. Tier 3 - Repeatable; ascending toward Tier 4 - Adaptive.

Self-attested · cross-walked under SOC 2 + HITRUST.
Honest framing: SOC 2 Type II and HITRUST i1 cannot be self-attested - both require independent assessment. We publish the live mapping work and the third-party engagement schedule. The first formal third-party penetration test is scheduled Q3 2026; until then we operate against a self-conducted vulnerability assessment refreshed quarterly. Both sets of evidence are available under NDA.

Encryption + cryptographic posture

LayerAlgorithmFIPSNotes
Validator signing (CREB™) Ed25519 + Dilithium-III hybrid FIPS 204 (post-quantum) Every Court-Ready Evidence Bundle is dual-signed; remains forgery-resistant after large-scale quantum computers.
MPC threshold signing secp256k1 ECDSA + Ed25519 (per chain) FIPS 186-5 2-of-3 user-controlled key shares; JIL never holds a complete key.
At-rest encryption AES-256-GCM (per-record IV) FIPS 197 All databases and object stores encrypted; per-record IVs prevent ciphertext re-identification.
In-transit TLS 1.3 only FIPS 140-3 ciphersuites TLS 1.0/1.1/1.2 disabled at edge; HSTS preload on the primary zone.
Key derivation BIP-44 hierarchical deterministic Bitcoin standard Single master key derives chain-specific subkeys for 13 chains.

Operational security posture

Identity + access

MFA + WebAuthn passwordless on all admin paths. SSH key-only on infrastructure (no password auth). YubiKey hardware tokens for treasury operations. Quarterly access review.

Network

Cloudflare WAF + DDoS at edge, TLS 1.3 only. Cloudflared tunnels (no public ingress to origin). Internal services bind 127.0.0.1 only. Read-only Docker rootfs + no-new-privileges on production services.

Validator network

14-of-20 BFT consensus across 13+ jurisdictions. Adaptive quorum (70% target). SentinelAI Fleet Inspector with anomaly heartbeats. Per-validator unique SSH keys, rotated quarterly.

Audit logging

Append-only audit_log table with cryptographic seal. Pino structured logs across all 250 services. Time-synchronized (NTP). Administrator + operator actions logged separately from user actions.

Backup + DR

Nightly Postgres dumps + WAL streaming to encrypted off-site object storage. Quarterly DR drill. RPO < 24h. RTO < 4h for read paths, < 12h for full settlement.

Vulnerability management

npm audit + Dependabot continuous. Trivy image scanning landing Q3 2026 with CVSS ≥ 7 build-block. Self-conducted vulnerability assessment refreshed quarterly. First formal third-party pentest Q3 2026.

Subprocessors

Every third party that handles JIL data, with current contractual status. Reviewed quarterly. Last refreshed 2026-04-25.

SubprocessorServiceRegionCert / postureStatus
Hetzner Online GmbHCloud compute, object storageDE (Nuremberg, Helsinki, Falkenstein)ISO 27001Active
Cloudflare, Inc.Edge TLS, CDN, DNS, WAF, tunnelsGlobalSOC 2 Type II + ISO 27001 + HIPAA-eligibleActive
GitHub (Microsoft)Source code repositoryUS / EUSOC 2 Type II + ISO 27001Active
Google Workspace (Alphabet)Email, docs, videoUSSOC 2 Type II + HIPAA BAA availableActive
Stripe, Inc.Payments + subscription billingUSPCI DSS Level 1 + SOC 2 Type IIActive
Slack (Salesforce)Internal team communicationsUSSOC 2 Type IIActive
Smarty (SmartyStreets)US + international address verificationUSStandard ToS + DPAActive
Amazon Web Services, Inc.US-region cloud compute, RDS, S3, ALB, ACM (PHI-eligible workloads)US East (us-east-1)SOC 2 Type II + ISO 27001 + HIPAA-eligible (BAA)Active · deployed 2026-04-25
OFAC, UN, HMT, OFSI, HHS-OIG, CMS, GLEIF, OpenSanctions, FATF, GSA / SAM.govOne-way sanctions / regulatory data feeds (no JIL data sent)Government / internationalPublic ToSActive
Drata or Vanta (selection pending)Compliance evidence automationUSSOC 2 Type II (both)Pending Q2 2026
External pentest firm (NCC / Bishop Fox / Trail of Bits, TBD)Annual third-party penetration testUSCREST / OSCP qualifiedPending Q3 2026

A full subprocessor inventory including pending healthcare-specific verification APIs (NPDB, FSMB, CAQH, DEA Diversion, SSA DMF) and signed BAAs for PHI workloads is available under NDA on request.

Compliance roadmap

Aggressive compressed timeline. All in-flight items target Q3 2026 completion.

2026-Q2 · live

Self-attested baseline + AWS US-region online

16-policy compliance package signed (information security, access control, incident response, encryption, vendor management, etc.). First quarterly vulnerability assessment + IR tabletop completed. Personnel security awareness training cycle attested. AWS us-east-1 deployment LIVE since 2026-04-25 (us.jilsovereign.com, 7 PHI-eligible services, A+ TLS, nightly Hetzner→AWS replication).

2026-Q3 · target completion

SOC 2 Type II report · HITRUST i1 cert · pentest · first BAA

First formal third-party pentest (NCC / Bishop Fox / Trail of Bits or equivalent). SOC 2 Type II report issued (compressed first-year observation period). HITRUST CSF v11 i1 (Implemented level) certification. Trivy CI image scanning live. Full MDM rollout. Drata or Vanta continuous-control monitoring. Background-check vendor active. First signed BAA + first PHI customer workload on AWS us-east-1. Healthcare-specific verification API integrations live (NPDB, FSMB DocInfo, CAQH ProView, SSA DMF, DEA Diversion).

2026-Q4 and beyond

ISO 27001, ISO 27017, NYDFS Part 500, HITRUST r2

ISO 27001 + ISO 27017 (cloud-controls extension), NYDFS Part 500, HITRUST r2 Validated upon UHG-class customer demand. Continuous control monitoring + automated evidence collection.

Governance, residency, and incident posture

Data residency

EU + US, both live. EU primary: Hetzner (Nuremberg, Helsinki, Falkenstein) for compute and object storage. US: AWS us-east-1 LIVE since 2026-04-25 (us.jilsovereign.com, BAA-eligible, 7 PHI services, nightly Hetzner→AWS replication). Edge via Cloudflare (global).

Incident response

Documented IR Plan with detection < 5 min target, containment < 60 min for Sev 1, post-incident report within 14 days. Quarterly IR tabletop exercises. HIPAA breach notification path documented.

Privacy + DPAs

Standard DPA (GDPR Art. 28-compliant) on every customer engagement. BAA available for HIPAA-regulated workloads. Standard Contractual Clauses for cross-border transfers. Schrems II analysis on US-region routing.

Personnel

All personnel: NDA, IP assignment, annual security + HIPAA awareness training. Production-access roles: background screening (in plan; vendor selection by first hire). Termination workflow within one business day.

Business continuity

10 active SCN validators across 13 jurisdictions; quorum continues at 14-of-20 BFT through any 6-validator outage. Multi-region active-active for read paths. Documented BCP refreshed annually.

Vendor risk

Quarterly subprocessor review. Pre-onboarding security questionnaire + DPA + cert verification. Public subprocessor list (above) updated within 7 days of any change.

Need the auditor-evidence layer?

Procurement, security, and compliance teams can request the full set of NDA-gated artifacts: signed inventories, vulnerability assessment, IR tabletop reports, framework mapping spreadsheets (HIPAA, SOC 2, HITRUST, NIST CSF), encryption-policy detail, and Internal Compliance dashboard access. Two business day turnaround after MNDA execution.

Request artifacts under NDA →

Security contact

For coordinated vulnerability disclosure or security questions: security@jilsovereign.com · PGP key on request. We acknowledge within one business day and target a 90-day fix window for severity-rated findings (SLAs detailed in Vulnerability Management Policy, available under NDA).

JIL Sovereign Technologies, Inc. (Delaware C-corp) · Last refreshed 2026-04-26 · Refreshed monthly