Enterprise Security

Security at PeytonixAI

PeytonixAI is built for organizations that manage sensitive audit data in regulated environments. Security is foundational to our architecture, not an afterthought.

Secure-by-Design Architecture

PeytonixAI uses a split architecture that separates application logic from customer data. Your sensitive evidence files remain in your AWS account at all times.

PeytonixAI Infrastructure

Application code, user interface, and orchestration logic. No customer evidence is stored here.

Customer AWS Account

Evidence files stored in customer-owned S3 buckets, encrypted with customer-managed KMS keys.

Evidence Split Architecture: Evidence files are uploaded and downloaded directly between user browsers and customer S3 via presigned URLs. PeytonixAI servers never see, store, or process evidence file contents.

Access Control

PeytonixAI enforces access control at multiple layers to ensure users only access data they are authorized to see.

Role-Based Access Control (RBAC)

Five predefined roles with graduated permissions:

  • Viewer: Read-only access to assigned entities
  • Preparer: Create and edit workpapers, upload evidence
  • Reviewer: Review and approve workpapers
  • Manager: Manage audits, assign users, run reports
  • Admin: Full system access, user management, configuration

Entity-Level Access Control (ELAC)

Users are assigned to specific entities (business units, subsidiaries, audit engagements). Access is automatically scoped to assigned entities only. Unauthorized entity access returns 404 (not 403) to prevent enumeration of entity IDs.

Confused Deputy Prevention

All cross-account AWS access uses STS AssumeRole with mandatory ExternalId. This prevents confused deputy attacks where a malicious actor could trick PeytonixAI into accessing another customer's resources.

Identity & Authentication

SSO Integration

SAML 2.0 and OIDC support for enterprise identity providers (Okta, Azure AD, Google Workspace, etc.).

SCIM Provisioning

Automated user provisioning and deprovisioning via SCIM 2.0. Changes sync in real time.

Session Security

JWT tokens with configurable expiration. Session invalidation propagates immediately on user deactivation or role change.

Multi-Factor Authentication

MFA enforced through customer identity provider. PeytonixAI honors MFA requirements set in your IdP.

Encryption & Key Management

Data at Rest

All evidence files are encrypted using SSE-KMS with customer-managed keys. Customers control their own KMS key in their AWS account. PeytonixAI cannot decrypt evidence without assuming the customer-provided IAM role.

Data in Transit

All traffic encrypted via TLS 1.2+. Presigned URLs for S3 uploads/downloads enforce HTTPS.

Key Management

  • Customer owns and controls KMS key
  • Key rotation configurable by customer
  • PeytonixAI never has direct access to key material
  • Access revocable by deleting IAM trust relationship

Availability & Resilience

Target Availability 99.9% uptime SLA
Recovery Point Objective (RPO) 1 hour
Recovery Time Objective (RTO) 4 hours
Evidence Durability 99.999999999% (S3)

Fail-Closed Design

If authentication or authorization services become unavailable, the system denies access rather than failing open. This ensures security controls remain effective even during outages.

Graceful Degradation

If the customer's AWS account becomes unreachable, users can continue working with cached metadata. Evidence uploads/downloads are queued and resume automatically when connectivity is restored.

Audit Logging

Immutable Audit Trail

All user actions, access decisions, and system events are logged to append-only storage. Logs cannot be modified or deleted, even by administrators. Default retention is 7 years for security events.

What's Logged

  • Authentication events (login, logout, failures)
  • Authorization decisions (access grants and denials)
  • Data access (evidence uploads, downloads, views)
  • Configuration changes (user roles, entity assignments)
  • AI interactions (prompts, responses, human approvals)

Customer Access

Customers can enable AWS CloudTrail on their evidence bucket for independent logging of all S3 access. Combined with PeytonixAI application logs, this provides complete audit coverage.

Compliance & Certifications

SOC 2 Type II

Annual audit covering Security, Availability, and Confidentiality trust services criteria.

Penetration Testing

Annual third-party penetration test. Customers may conduct their own tests with coordination.

Vulnerability Management

Continuous scanning with defined remediation SLAs based on severity.

Available Documentation

  • SOC 2 Type II report (under NDA)
  • Penetration test summary (under NDA)
  • Security questionnaire responses (SIG, SIG Lite, CAIQ)
  • Architecture and security documentation
  • Data processing agreement with SCCs

Contact sales@peytonixai.com for SOC 2 report access or security documentation.

Responsible Disclosure

We welcome responsible security research. If you discover a vulnerability, please report it to us privately.

Report security vulnerabilities to security@peytonixai.com. We commit to acknowledging receipt within 2 business days and providing regular updates on remediation progress.

What to Include

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact assessment
  • Your contact information for follow-up

Questions About Security?

Our team is available to discuss your organization's security requirements and provide detailed documentation.

Security Questions

security@peytonixai.com

Sales & SOC 2 Reports

sales@peytonixai.com

Legal & DPA

legal@peytonixai.com