Security
Attestr is built for regulated industries. Security is foundational to every layer of the platform — not an afterthought.
Cryptographic Integrity
Every record in the Attestr ledger is protected by multiple layers of cryptographic verification, ensuring that tampering with any record is mathematically detectable.
- SHA-256 hash chaining — every record includes the hash of the previous record, creating an unbreakable sequence
- Ed25519 digital signatures — every record is signed with a private key; verification uses our publicly available key
- Merkle tree batching — records are grouped into Merkle trees for efficient batch verification and selective proof
- Append-only ledger — UPDATE and DELETE operations are revoked at the PostgreSQL level; records are permanent
Infrastructure
Attestr infrastructure is designed for high availability, durability, and defense in depth.
- All data encrypted at rest using AES-256
- All data encrypted in transit using TLS 1.3
- Database hosted on isolated, dedicated infrastructure with automated backups
- Network-level isolation between tenant environments
- Automated vulnerability scanning and dependency auditing
Access Control
Every API request to Attestr is authenticated and time-limited to prevent unauthorized access and replay attacks.
- HMAC-SHA256 request signing — every request is signed with your secret key, including the HTTP method, path, timestamp, and body
- 5-minute replay window — requests older than 5 minutes are rejected, preventing replay attacks
- Per-tenant API credentials — each organization receives unique keys that cannot access other tenants' data
- Credential rotation supported without downtime
Data Privacy & Tenant Isolation
Your data belongs to you. Every tenant operates in complete isolation.
- Complete data isolation between tenants — separate ledger chains, separate keys, separate verification
- No cross-tenant data access under any circumstances
- No data sold, shared, or used for training
- Data retention policies configurable per tenant
- Evidence packets are self-contained — no data leaks through shared infrastructure
Compliance
Attestr is designed from the ground up to support compliance and audit requirements in regulated industries.
- Audit-friendly architecture — every record is independently verifiable with standard cryptographic tools
- Examiner independence — third parties verify evidence without needing an Attestr account
- Immutable record-keeping satisfies requirements for tamper-proof audit trails
- Open-source verification engine — MIT licensed, self-hostable for zero vendor dependency
- SOC 2 Type II readiness — controls mapped to trust service criteria
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a security issue, we appreciate your help in disclosing it responsibly.
Email: security@attestr.io
Please include a description of the vulnerability, steps to reproduce, and any relevant proof of concept. We aim to acknowledge reports within 24 hours and provide a resolution timeline within 72 hours.
Last updated: March 2026. For questions about Attestr security, contact security@attestr.io.