AssureLiner
Security & trust

Security isn't a page.It's a posture.

AssureLiner is built for enterprise shipping and logistics — where a single compromised BL or leaked rate sheet costs more than the software. Here's what we do about it.

RTO
≤ 4h
Recovery Time Objective (Enterprise)
RPO
≤ 15 min
Recovery Point Objective (Enterprise)
Breach notification
≤ 72h
From confirmed incident
Critical patch SLA
≤ 72h
Critical CVE remediation
Support / monitoring
24 × 7
Managed detection & response
Pen test cadence
Annual
CREST-accredited third-party
Frameworks

Compliance that procurement can actually use.

Every framework below is backed by evidence you can request, not marketing copy. Certified means an audit report exists. Aligned means the controls are implemented and internally audited, awaiting external audit.

Certified

ISO 27001

Information Security Management System

Certified

ISO 14001

Environmental Management

Certified

ISO 45001

Occupational Health & Safety

Certified

PCI-DSS

Payment card data protection (where applicable)

In progress

SOC 2 Type II

Security, Availability, Confidentiality

Aligned

CIS Controls

CIS Critical Security Controls v8

Aligned

GDPR / DPDP

EU General Data Protection Regulation, India DPDP Act

In progress

ISO 27701

Privacy Information Management (PIMS)

Controls

Controls across the whole stack.From device to data-plane to decision.

Data protection

Encrypted in flight and at rest. Tenant-isolated by design.

  • Encryption in transit

    TLS 1.3 for all external traffic. mTLS between services inside the trust boundary.

  • Encryption at rest

    AES-256 on databases, object storage, backups, and log stores.

  • HSM-backed key management

    Customer master keys in AWS KMS / Azure Key Vault / GCP KMS with HSM backing. Key rotation automated.

  • Tenant isolation

    Logical isolation by default; dedicated databases and VPCs available on Enterprise and Revenue-share tiers.

  • Data export & deletion

    Export in Parquet / CSV / JSON on 30-day notice. Hard-delete workflows with tombstone proof.

  • Backup & recovery

    Point-in-time recovery up to 35 days. Cross-region replicated backups, quarterly restore drills.

Identity & access

SSO, MFA, RBAC — with evidence on every action.

  • SSO via SAML 2.0 / OIDC

    Integrates with Okta, Azure AD, Google Workspace, Ping, and custom IdPs.

  • Multi-factor authentication

    TOTP, FIDO2 / WebAuthn, and SMS fallback — configurable enforcement per role.

  • Fine-grained RBAC

    Role, scope, and attribute-based policies across every module. No implicit admins.

  • SCIM provisioning

    Lifecycle automation — joiner, mover, leaver — from your IdP.

  • Just-in-time access

    Time-bound elevation for production support with approval chain and auto-revoke.

  • Session controls

    IP allow-lists, geo controls, device posture checks, configurable session TTL.

Application security

Shift-left SDLC. Tests, scans, and reviews baked into CI.

  • Secure SDLC

    Threat modelling on new modules. Mandatory peer review. Signed commits.

  • Static + dependency scanning

    SAST on every PR; dependency scanning with severity gates; SBOM generated per build.

  • Dynamic + container scanning

    DAST on staging; container image scanning in registry; runtime admission controls.

  • Third-party penetration testing

    Annual CREST-accredited pentest; remediation SLAs by severity; reports available under NDA.

  • Bug bounty

    Private bug bounty with triaged disclosure; payout tiers aligned to CVSS.

  • Secrets management

    HashiCorp Vault / cloud KMS-backed. No secrets in repo, in env files, or in container images.

Infrastructure security

Segmented, monitored, recoverable.

  • Zero-trust network

    No implicit trust between services. Identity-bound, mTLS-validated, policy-gated.

  • DDoS protection

    Cloudflare / AWS Shield on all public edges. Managed WAF rulesets + custom rules.

  • Private connectivity

    PrivateLink / VPC peering / IP allow-lists for enterprise customers who want to avoid the public internet.

  • Segmented environments

    Dev, staging, and production in separate accounts with no shared identity or data.

  • Immutable infrastructure

    All infra as code (Terraform). No snowflake servers. Changes go through CI with approval.

  • Vulnerability management

    OS + dependency patching SLAs: Critical ≤ 72h, High ≤ 14d, Medium ≤ 30d.

Operational security

See everything. Respond fast. Recover cleanly.

  • 24×7 monitoring

    SIEM with managed detection & response. Anomaly detection across auth, data-plane, and network.

  • Incident response

    Documented IR playbooks. On-call rotation. Customer notification within 72 hours of confirmed breach.

  • Service continuity (RTO/RPO)

    RTO ≤ 4h, RPO ≤ 15 min for Enterprise tier. Tested quarterly with published results.

  • Change management

    All production changes via CI/CD pipeline, peer-reviewed, with automated rollback.

  • Employee training

    Annual security + privacy training, mandatory for all staff. Phishing drills quarterly.

  • Background verification

    Pre-employment background checks for all roles with data-plane access.

AI security & governance

Explainable. Approvable. Auditable. And never trained on your data.

  • No training on customer data

    Customer data is never used to train shared foundation models. Private fine-tunes stay private — with written data use terms.

  • Human-in-the-loop

    High-stakes AI recommendations route through Approval Workflows; no silent auto-action by default.

  • Explainability

    Every recommendation includes inputs, weights, confidence, and a drill-down trail.

  • Model registry + versioning

    Every production model is versioned, documented, and tied to a change-approval ticket.

  • Red-teaming + evals

    Adversarial + regression eval suites run on every model promotion; results attached to release.

  • Data-plane isolation

    Inference runs against tenant-isolated data stores; no cross-tenant leakage through prompts or embeddings.

Privacy & customer controls

Your data, your call. Audit-ready by default.

  • Data processing agreement

    Standard DPA with GDPR / DPDP-compliant SCCs. Custom DPAs available for Enterprise.

  • Data subject rights

    Access, rectification, erasure, portability — fulfilled within statutory windows.

  • Consent management

    Consent tracked per data subject, purpose, and timestamp — retrievable for regulator review.

  • Audit trail

    Every data-plane action is logged and tamper-evident. Customer-accessible audit exports.

  • Data residency

    Deployments in US, EU, UK, India, Singapore, Australia. Regional pinning per tenant.

  • Sub-processor disclosure

    Public, versioned sub-processor list. 30-day advance notice of changes.

Physical & vendor

Tier-1 cloud. Audited vendors. Documented supply chain.

  • Tier-1 hyperscaler hosting

    AWS / Azure / GCP regions with their own SOC 2 / ISO 27001 / PCI certifications.

  • Vendor risk management

    Annual reviews of critical sub-processors; SLA + security posture tracked.

  • Endpoint protection

    Managed EDR on all staff devices; device posture checks for production access.

  • Physical office security

    Badge-access offices with visitor logging at delivery centres.

  • Secure disposal

    Certified secure destruction of decommissioned storage media with certificates of destruction.

AI governance

AI with receipts.

Every AI recommendation in AssureLiner ships with explanation, confidence, approval chain and an audit trail — because a black-box decision on a 20,000-TEU voyage is a liability, not a feature.

No training on your data

Customer data is not used to train shared models. Private fine-tunes stay private.

Approval Workflows

High-stakes AI actions route through the same approval chain you already use.

Audit trail

Every AI recommendation, input, and decision is logged and drill-down-able.

Red-team evals

Adversarial + regression suites on every model promotion. Results attached to release.

Isolation

Inference runs in tenant-isolated stores. No cross-tenant leakage.

Human-in-the-loop

No silent auto-action by default. Autonomy is a per-customer, per-use-case decision.

Trust center

Evidence, on request.

Security questionnaires, audit reports, penetration-test summaries, sub-processor lists, DPAs — available under NDA to enterprise prospects and customers.

  • SOC 2 Type II report (once issued)
  • ISO 27001 certificate + Statement of Applicability
  • Third-party penetration-test executive summary
  • Sub-processor list + change log
  • Standard DPA + optional custom DPA
  • Business continuity + disaster recovery plan summary

Request an evidence pack

Tell us your role and engagement stage — we'll send the right pack with an NDA template.

Responded within one business day.

For procurement

Procurement & security FAQ

Can we get your SOC 2 / ISO reports?

+

Yes — evidence packs (audit reports, penetration-test summaries, SOC 2 Type II once issued) are available under NDA. Request via the trust center or your account team.

Do you support SSO and SCIM?

+

Yes. SAML 2.0 and OIDC SSO are included at the Business tier and above. SCIM provisioning is included on Enterprise and Revenue-share tiers.

Where will our data be stored?

+

You pick the region — US, EU, UK, India, Singapore, or Australia. Cross-region replication only with explicit consent; sub-processor list and region are disclosed in the DPA.

How do you handle AI and LLM risk?

+

We don't train shared models on customer data. High-stakes AI recommendations go through Approval Workflows. We version, document, and red-team every production model.

What happens during a security incident?

+

We notify affected customers within 72 hours of confirmation with impact, root cause, corrective actions, and preventive commitments. Post-mortems available on request.

Do you offer BYOC / private cloud / on-prem?

+

BYOC (AWS, Azure, GCP) at Enterprise subscription. Private cloud and on-prem under Project and Revenue-share engagements.

Can we run our own pen test?

+

Yes. We welcome customer-run pen tests against staging environments on scheduled windows, with a signed scope and rules-of-engagement.

What's your approach to regulated industries (port authorities, customs)?

+

Our compliance stack covers the common ground (ISO 27001, SOC 2, PCI-DSS, CIS). For regulated deployments we bring jurisdiction-specific controls, regional hosting, and evidence packs mapped to the regulator's framework.

Running a security review? We've done this before.

Bring your questionnaire — we'll turn it around in a week. No vendor-speak, no hiding.