Security

Built to be trusted

Immutis is security-first infrastructure. Every architectural decision is made to preserve the integrity and provenance of digital evidence against manipulation, regardless of who holds the data.

Security pillars

01

Hardware Attestation

Every capture is bound to a verified hardware identity via TEE (Trusted Execution Environment). Evidence cannot be produced by an unverified device.

02

Cryptographic Sealing

At the moment of capture, a cryptographic hash is computed and sealed inside the secure enclave. Any downstream modification invalidates the seal.

03

Zero-Knowledge Verification

Third parties can verify the integrity and provenance of evidence without ever accessing the underlying content. Privacy is preserved by design.

04

Data Isolation

Evidence data is stored within tenant-isolated environments using Supabase Row Level Security. No cross-tenant data access is architecturally possible.

05

Immutable Audit Log

Every interaction with evidence — capture, retrieval, verification — is logged to an append-only audit trail for forensic accountability.

06

Compliance Ready

Architecture is designed to meet GDPR, CCPA, and SOC2 Type II requirements. Data retention policies are configurable per jurisdiction.

Verification chain

01

Capture

Hardware-bound TEE records the event

02

Seal

Cryptographic hash locked in secure enclave

03

Anchor

Seal committed to forensic ledger

04

Verify

Any party can validate without data access

Compliance status

GDPR
Compliant
CCPA
Compliant
SOC2 Type II
In progress
ISO 27001
Planned

Security questions?

Our security team is available to answer technical due-diligence questions from enterprise buyers and compliance teams.

Talk to our security team