Skip to main content

Compliance & Standards

Qpher is built for organizations that need to meet regulatory and compliance requirements. This page summarizes our current compliance posture, the standards we align with, and our roadmap for certifications.

NIST Post-Quantum Cryptography Standards​

Qpher implements the algorithms standardized by NIST for post-quantum cryptography:

AlgorithmNIST StandardFIPS DocumentUse in Qpher
Kyber768 (ML-KEM-768)ML-KEMFIPS 203Key Encapsulation Mechanism for encryption
Dilithium3 (ML-DSA-65)ML-DSAFIPS 204Digital signatures

Both algorithms provide NIST Level 3 security, which offers strong protection against both classical and quantum computer attacks. These are the same algorithms recommended by NIST, NSA, and CISA for transitioning to quantum-resistant cryptography.

Why NIST Level 3?

NIST Level 3 provides security roughly equivalent to AES-192 against classical attacks and strong resistance against known quantum algorithms. It balances security strength with performance for most enterprise use cases.

SOC 2 Type II​

ItemDetail
StatusCurrently in preparation
TargetSOC 2 Type II certification
ScopeSecurity, Availability, Confidentiality

Qpher is actively working toward SOC 2 Type II certification. Our infrastructure and processes are designed with SOC 2 controls in mind from day one:

  • Access control: Role-based access, API key authentication, Zero Trust policy engine
  • Encryption: AES-256-GCM at rest, TLS 1.3 in transit
  • Monitoring: Centralized logging, audit trails, alerting
  • Change management: CI/CD pipeline with automated testing
  • Incident response: Documented process with 72-hour breach notification
Enterprise Customers

Enterprise plan customers can request our current SOC 2 readiness report and discuss specific compliance requirements with our team. Contact security@qpher.ai.

GDPR Compliance​

Qpher complies with the General Data Protection Regulation (GDPR) for customers processing data of EU residents.

Data Processing​

AspectHow Qpher Handles It
RoleQpher acts as a data processor on your behalf
Data minimizationWe process only the data you send for encryption or signing
Purpose limitationYour data is used solely for the requested cryptographic operation
StorageCiphertexts and signatures are returned to you; we do not store your plaintext
RetentionKey metadata is retained while your account is active; deleted upon account closure
PortabilityPublic keys and metadata can be exported at any time

Data Processing Agreement (DPA)​

A Data Processing Agreement is available for customers who need one. The DPA covers:

  • Scope of data processing
  • Sub-processor list
  • Data breach notification (72-hour commitment)
  • Data deletion upon termination
  • Technical and organizational security measures

Contact legal@qpher.ai to request a DPA.

Right to Erasure​

When you delete your Qpher account or request data erasure:

  1. All API keys are immediately revoked.
  2. All PQC key pairs are securely deleted (private keys are overwritten before deletion).
  3. Tenant metadata is purged from the database.
  4. Audit logs are retained for 180 days (for regulatory compliance), then deleted.

Data Residency​

PlanData Residency Options
Free, Starter, Growth, ProDefault region (US)
EnterpriseConfigurable data residency (US, EU, APAC)

Enterprise customers can specify where their cryptographic keys and metadata are stored. This is essential for organizations subject to data sovereignty regulations.

Audit Logging​

Every cryptographic operation and administrative action in Qpher generates an audit log entry. Audit logs are designed for compliance reporting and incident investigation.

What Is Logged​

Event TypeExamples
AuthenticationAPI key used, login attempt, JWT issued
Cryptographic operationsKEM encrypt, KEM decrypt, sign, verify
Key managementKey generated, key rotated, key retired, key archived
AdministrativePlan changed, API key created, API key revoked
Security eventsRate limit exceeded, policy denial, invalid API key

Log Properties​

PropertyValue
Retention180 days
FormatStructured JSON
Fieldstimestamp, event_type, tenant_id, request_id, result, metadata
Tamper protectionAppend-only log storage
AccessAvailable to account administrators through the portal
Sensitive Data Redaction

Audit logs never contain private keys, plaintext data, or full API keys. Sensitive fields are automatically redacted before logging.

Security Contact​

If you have questions about Qpher's compliance posture, need documentation for a procurement review, or want to report a security concern: