Compliance

Compliance mapping.

How Aorka's technical controls map to HIPAA, SOC 2, NIST, and FINRA. This is not a certification claim — it's a transparent mapping of what we've built and which compliance requirements it satisfies.

HIPAA

HIPAA Technical Safeguards

The HIPAA Security Rule (45 CFR Part 164, Subpart C) defines technical safeguards for protecting electronic protected health information (ePHI). Aorka does not store ePHI directly, but as a tool with execution access to systems that may contain ePHI, these controls are directly relevant.

Requirement Aorka Implementation
Access Control 164.312(a)(1) Role-based access control (admin, tenant_admin, tech, viewer, provisioning). Unit-scoped permissions with inheritance. Multi-tenant isolation — each organization is structurally separated at the database level. New units start read-only by default. Personal workspaces with ownership-based isolation.
Unique User ID 164.312(a)(2)(i) Azure AD SSO with per-user identity. Every action is attributed to a specific authenticated user. No shared accounts — tenant auto-discovery assigns users to their organization automatically.
Emergency Access 164.312(a)(2)(ii) Credential vault break-glass access with MFA verification, full audit logging, and webhook alerts. MFA backup codes for account recovery. Admin session management with remote revocation.
Automatic Logoff 164.312(a)(2)(iii) Session expiration with configurable timeout. Session heartbeat monitoring. Active session listing with ability to terminate any session remotely.
Audit Controls 164.312(b) Comprehensive audit log covering: authentication events, job execution, script approvals/rejections, credential access, endpoint registration, configuration changes, MFA events, and administrative actions. Every entry includes user identity, timestamp, action type, and target resource.
Integrity Controls 164.312(c)(1) HMAC-SHA256 job signing — every command is cryptographically signed at creation and verified at dispatch. RSA-2048 signed agent updates with trusted hash registry. Credential vault uses AES-256-GCM authenticated encryption (tamper detection built in).
Authentication 164.312(d) Azure AD SSO (multi-tenant). TOTP-based MFA for sensitive operations. Device fingerprinting for agents. Mutual server authentication via HMAC challenge-response. Rate limiting on authentication endpoints.
Transmission Security 164.312(e)(1) TLS 1.2+ on all connections (HTTPS for API, WSS for agent WebSocket). Mutual server authentication adds a second verification layer beyond TLS. Agents use outbound-only connections — no inbound ports or listening services. HSTS headers enforced. Let's Encrypt certificates with auto-renewal.
SOC 2

SOC 2 Trust Service Criteria

SOC 2 evaluates controls across five Trust Service Criteria. The mappings below cover Security (Common Criteria) and Availability, which are the most relevant to an infrastructure management platform.

Criterion Aorka Implementation
Logical Access CC6.1 Five-tier RBAC with unit-scoped inheritance. Tenant isolation at the database layer. New users from unknown tenants receive "provisioning" role (no access) until explicitly approved by a tenant admin. Unit read-only locks prevent write operations until explicitly enabled.
Authentication CC6.2 Azure AD SSO with multi-tenant auto-discovery. TOTP MFA with backup codes. Session management: active session listing, remote revocation, security info dashboard. API authentication via signed tokens. Agent authentication via DPAPI-encrypted credentials with device fingerprint binding.
Authorized Access CC6.3 User-unit access grants with read/write distinction. Write access enables script execution up to score 50. Read access limits to diagnostic scripts (score 0–10). Credential access requires separate MFA verification. MCP tokens are IP-bound with MFA-protected rebinding.
System Boundaries CC6.6 Agents initiate outbound WebSocket connections only — no inbound ports, no listening services, no VPN requirements. Three-layer script safety pipeline gates all execution: deterministic regex filter, AI risk scoring, and human approval. Hard ceiling at score 51 with no override.
Monitoring CC7.1 / CC7.2 Audit log captures all security-relevant events with user attribution. Anomaly detection on fact values using Welford's algorithm for running variance. AlertService with configurable severity thresholds, in-app notifications, webhook delivery, and email alerts.
Change Management CC8.1 Agent updates are RSA-2048 signed with an offline private key. Trusted hash registry verifies agent versions on connection. Pull-based update model — agents decide whether to apply. Staged rollouts to test endpoints before fleet-wide deployment.
Risk Mitigation CC9.1 Script safety pipeline with deterministic floor (regex) and hard ceiling (score 51+ blocked, no admin override). Script reliability scoring based on real execution history. AI risk evaluation independent of the chat model. HMAC job signing prevents job tampering between API and dispatch layers.
NIST

NIST Cybersecurity Framework 2.0

The NIST CSF organizes cybersecurity controls into six functions. The mappings below reference both CSF 2.0 categories and the corresponding NIST 800-53 control families.

Identify

ID.AM

Asset Management

Automatic endpoint inventory via agent registration. Device fingerprinting captures hardware identity. Living knowledge base tracks infrastructure state — software versions, configurations, network topology — with confidence scoring and automated refresh cycles.

ID.RA

Risk Assessment

Script safety pipeline scores every operation for blast radius and reversibility. AI risk evaluation analyzes intent and impact. Script reliability history tracks real-world success/failure rates. Anomaly detection flags unexpected changes in infrastructure state.

Protect

PR.AA

Identity Management & Access Control

Five-tier RBAC. Azure AD SSO with multi-tenant auto-discovery. TOTP MFA. Unit-scoped access with read/write distinction. IP-bound MCP tokens. Device-fingerprinted agents. Session management with remote revocation. Provisioning role blocks access until explicit admin approval.

PR.DS

Data Security

AES-256-GCM credential encryption at rest. TLS 1.2+ for all data in transit. Tenant isolation at the database layer. AI requests are stateless — no customer data stored by AI providers. Application secrets in AWS Secrets Manager with IAM-scoped access. DPAPI-encrypted agent configuration.

PR.PS

Platform Security

Three-layer script safety pipeline. Hard execution ceiling (score 51+) with no admin override. Deterministic regex command filter runs before AI evaluation. Human approval gate for all write operations. Unit read-only locks. HMAC job signing with independent verification at dispatch.

Detect

DE.CM

Continuous Monitoring

Automated fact validation on priority-based schedules. Welford's algorithm tracks running variance on measured values. Anomaly alerts fire on threshold breaches with configurable severity. Agent hash verification on every connection flags tampered or unrecognized versions.

DE.AE

Adverse Event Analysis

Comprehensive audit log with user attribution on every action. Job execution history with success/failure tracking. Script evaluation logs capture risk scores and classification decisions. HMAC signature failures logged and alerted. Server authentication failures flagged in audit trail.

Respond

RS.AN

Incident Analysis

Full audit trail for forensic analysis. Job history with command text, execution output, and approval chain. Conversation logs preserve the full context of AI interactions. Webhook alerts for credential access and anomaly events enable real-time incident notification.

RS.MI

Incident Mitigation

Remote session revocation. Unit read-only lock can immediately halt all write operations for a client. Endpoint-level agent controls. Trusted hash revocation blocks specific agent versions from connecting. MCP token revocation cuts off external AI tool access.

Recover

RC.RP

Recovery Planning

Knowledge base preserves infrastructure state for recovery reference. Orchestration engine enables multi-step recovery procedures with automatic failure propagation. Credential vault provides secure access to recovery credentials. AWS RDS automated backups for platform data.

FINRA

FINRA & SEC Cybersecurity

FINRA Rule 4370 (Business Continuity Plans) and SEC Regulation S-P (Safeguards Rule) require broker-dealers to protect customer information and maintain operational resilience. FINRA's cybersecurity guidance emphasizes access controls, data loss prevention, and vendor management — all areas where Aorka provides technical controls.

Requirement Aorka Implementation
Access Controls FINRA Cybersecurity Checklist Role-based access with five tiers and unit-scoped permissions. MFA on sensitive operations. Azure AD SSO — no local password management. Session monitoring with remote revocation. Provisioning role quarantines new users until explicit approval.
Data Loss Prevention Reg S-P Safeguards Rule Tenant isolation prevents cross-organization data access. AI requests are stateless — no customer data retained by AI providers. AES-256-GCM credential encryption. Audit logging on all data access events. Hard script execution ceiling prevents bulk data exfiltration commands.
Vendor Management FINRA Rule 3110 This compliance mapping provides transparency into Aorka's technical controls. Comprehensive audit logging enables oversight of all vendor-executed operations. Human approval gates ensure no automated action runs without explicit authorization. Webhook alerts notify your team of security-relevant events in real time.
Supervision & Audit Trail FINRA Rules 3110, 3120 Every action is attributed to a specific authenticated user. Full job history with command text, approval chain, execution output, and timestamps. Conversation logs preserve the complete context of AI-assisted decisions. Audit data is retained and queryable for examination and regulatory review.
Business Continuity FINRA Rule 4370 Knowledge base preserves infrastructure state for disaster recovery reference. Orchestration engine enables automated multi-step recovery procedures. Outbound-only agent architecture means no firewall reconfiguration during failover. AWS RDS with automated backups for platform data continuity.

Certifications & agreements

Business Associate Agreement (BAA)

Aorka offers a HIPAA Business Associate Agreement for healthcare organizations and other covered entities. Our BAA is based on the HHS model provisions and covers the specific nature of our platform's access to systems containing ePHI, including breach notification timelines, subcontractor obligations, and data retention and disposal. Contact us to execute a BAA.

Incident Response Plan

Documented incident response procedures covering detection, classification, containment, eradication, recovery, and post-incident review. Includes specific playbooks for account compromise, unauthorized execution, agent tampering, and control plane breach. Breach notification timelines align with HIPAA (10 business days) and applicable state laws.

Roadmap

Compliance is a continuous process. These are areas under active development.

SOC 2 Type II

The technical controls mapped above are implemented and operational. Aorka is currently undergoing the SOC 2 Type II audit process.

Per-tenant encryption keys

Currently, encryption uses platform-managed keys. Bring-your-own-key (BYOK) tenant encryption using per-tenant KMS keys is planned for organizations requiring independent key management.

Need a compliance review?

We'll walk through the controls with your compliance team and answer any questions.

Request a demo