Enterprise Security

Trust Center

Everything you need to evaluate Oceum's security posture. Built for enterprise procurement teams.

7
Security Audits
80+
Findings Fixed
AES-256
Vault Encryption
27
RLS-Protected Tables
MFA
Multi-Factor Auth
01

Security Overview

Oceum is built security-first with AES-256-GCM encryption, row-level security on all 27 tables, MFA/2FA enforcement, and 7 completed security audit rounds with 80+ findings remediated. SOC 2 Type II certification is in progress.

View Full Security Architecture
02

Compliance Documents

Policies, procedures, and governance frameworks supporting Oceum's SOC 2 readiness posture. Each document is maintained, versioned, and reviewed quarterly.

Incident Response Plan
Detection, escalation, containment, and post-mortem procedures.
Change Management
Code review, CI/CD pipeline controls, and deployment governance.
Data Classification
Sensitivity tiers, handling requirements, and retention policies.
Risk Register
Identified risks, likelihood assessments, mitigations, and residual risk.
Access Control
RBAC, least-privilege enforcement, and access review cadences.
Vendor Management
Third-party risk assessment, due diligence, and ongoing monitoring.
Subprocessors
Infrastructure and service providers that process customer data.
Data Processing Agreement
GDPR-aligned DPA covering data processing obligations and rights.
Privacy Policy
Data collection, usage, retention, and individual rights.
Terms of Service
Service agreement, SLAs, and customer obligations.
03

Architecture Highlights

Security controls are built into Oceum's architecture at every layer -- from credential storage to agent execution to tenant isolation.

Zero-Knowledge Vault
Credentials are encrypted with AES-256-GCM and injected at execution time via a blind relay. Oceum operators never see plaintext secrets. Keys are derived per-organization.
AES-256-GCM
Governed Execution
Every agent action passes through approval workflows and action whitelists. No agent can perform unauthorized operations -- all decisions leave an auditable trail.
APPROVAL WORKFLOWS
Multi-Org Isolation
Row-Level Security (RLS) enforced on all 27 tables with mandatory org_id scoping. Every query -- including service-role operations -- is org-bound. No cross-tenant data leakage.
RLS + ORG_ID
Session Security
JWT tokens with 24-hour expiry and 30-minute inactivity timeout. Multi-factor authentication supported across all accounts. Sessions are revocable and auditable.
JWT + MFA
04

Infrastructure

Production infrastructure is designed for security, reliability, and global performance.

Security Questions?

Our team is available to discuss Oceum's security architecture, provide additional documentation, or walk through our compliance posture.

Email security@oceum.ai

NDA-gated security documentation, penetration test reports, and SOC 2 audit artifacts are available upon request.