SOC 2 Type II Compliant

Security & Trust

Enterprise-grade security by design. Your compliance data deserves the highest protection.

Security-First Architecture

Built for organizations that take security seriously.

Encrypted at Rest

All data encrypted using AES-256. Encryption keys managed through secure key management systems.

Encrypted in Transit

TLS 1.3 for all connections. HSTS enabled. Certificate pinning for mobile apps.

SOC 2 Type II

Independently audited annually. Report available under NDA for enterprise customers.

SSO / SAML

Enterprise single sign-on. Support for Okta, Azure AD, OneLogin, and custom SAML providers.

Infrastructure

Reliable, redundant, and resilient.

99.9%
Uptime SLA
24/7
Monitoring
Daily
Backups

Cloud Infrastructure

Hosted on AWS with multi-region redundancy. Data centers in US, EU, and APAC available for enterprise customers.

  • AWS VPC isolation
  • WAF protection
  • DDoS mitigation

Data Handling

Your data is yours. We're just the custodians.

  • GDPR compliant
  • Data export available
  • Data deletion on request

Audit Trail

Every action is logged. Every change is tracked.

[2026-01-15 14:23:01] USER_ACTION user.login email=mpho@example.com ip=192.168.1.1
[2026-01-15 14:23:45] CASE_UPDATE case.status_change case_id=CS-2026-001 old=pending new=in_progress
[2026-01-15 14:24:12] EVIDENCE_ATTESTATION evidence.attested case_id=CS-2026-001 ref="contract_v2.pdf"
[2026-01-15 14:25:00] WORKFLOW_ACTION step.completed workflow=onboarding step=3
Immutable
Logs cannot be modified or deleted
Timestamped
UTC timestamps with microsecond precision
Exportable
Full audit log export for compliance

Evidence Mode: Security by Design

The most secure document is the one we never store.

Evidence Only Mode (Default)

  • Documents never leave your systems
  • Only references and attestations stored
  • Zero data breach risk for documents
  • Full audit trail maintained

Document Custody Mode (Enterprise)

  • AES-256 encryption for all files
  • Customer-managed keys available
  • Legal hold and retention policies
  • Version control and chain of custody

Responsible Disclosure

We welcome security researchers and reward responsible disclosure.

Found a vulnerability? We appreciate your help in keeping Ordiva secure.

Report a Vulnerability

support@mmekeservices.com