Additional Security & Compliance Controls
What protections are in place against AI-specific security risks such as prompt injection, data poisoning, or model inversion attacks?
Ultrasafe performs continuous adversarial testing across all deployed models, including prompt injection resistance, jailbreak prevention, data poisoning detection, and model inversion risk assessments. All models operate as fixed-weight systems inside attested TEEs, preventing extraction, tampering, or training-data inference. Annual third-party audits include AI-specific attack scenarios aligned with SOC 2 and ISO 27001 requirements.
Does Ultrasafe rely on any external subcontractors or secondary processors beyond the cloud platforms listed?
No. Ultrasafe uses no external subcontractors for model operations, data handling, or infrastructure management beyond Azure, AWS, and OCI. There are no additional processors or sub-processors, eliminating supply-chain risk. Full cloud provider lists and attestations are shared under NDA for enterprise reviews.
Is Ultrasafe prepared for emerging post-quantum cryptography requirements?
Yes. Ultrasafe supports hybrid post-quantum TLS (e.g., NIST ML-KEM/Kyber) and maintains cryptographic agility, enabling rapid migration to new post-quantum algorithms without architectural changes. Encryption modules are abstraction-layered, allowing ciphers, key exchanges, and signature schemes to be updated as standards evolve.
How are configuration changes to the Ultrasafe infrastructure tracked and controlled?
All changes follow a strict GitOps/IaC workflow: configurations are version-controlled, peer-reviewed, and deployed through CI/CD pipelines with mandatory approval gates. Automated policy enforcement checks security baselines before deployment. This ensures traceability, rollback capability, and consistent enforcement of change-management controls.
How often are disaster recovery and failover capabilities validated?
Ultrasafe conducts semi-annual disaster recovery and failover exercises, including regional failover, enclave re-attestation, and workload continuity validation. All results are documented and available for enterprise audit under NDA. Multi-cloud redundancy supports availability SLAs of 99.99%–99.999% depending on deployment tier.