Trust & Safety

Security & Compliance

EVA+ is built for enterprise procurement teams that say no to everything. Here's how we've built security into every layer of the platform.

Request Security Documentation

We provide the following on request for qualified enterprise prospects:

  • · SOC 2 Type II report (under NDA)
  • · Data Processing Agreement (DPA)
  • · Security questionnaire responses (SIG Lite / CAIQ)
  • · Penetration test executive summary
  • · Architecture diagram (private-deploy mode)

Infrastructure

  • Deploys into customer-owned AWS environment (VPC tenancy available)
  • AWS KMS — AES-256 encryption at rest for all stored data
  • TLS 1.2+ enforced for all data in transit
  • Network isolation via VPC with private subnets and security groups
  • No data leaves customer AWS boundary in private-deploy mode

Access Controls

  • IAM least-privilege access — every agent action scoped to minimum required permissions
  • Role-Based Access Control (RBAC) within the EVA+ platform
  • Multi-factor authentication (MFA) enforced for all EVA+ accounts
  • Single Sign-On (SSO) via SAML 2.0 / OIDC for enterprise customers
  • Session tokens expire after inactivity; refresh token rotation enforced

Agent Safety

  • Dry-Run mode: every agent write action requires explicit human approval
  • Immutable audit log: every agent action logged with timestamp, user, and outcome
  • No irreversible actions (contracts, payments, public posts) without dual approval
  • Rate limits and circuit breakers prevent runaway automation

Compliance

  • SOC 2 Type II aligned practices (report available on request)
  • GDPR-compliant data processing — DPA available for enterprise customers
  • CCPA compliant — data subject rights honored within 30 days
  • Standard Contractual Clauses (SCCs) for cross-border data transfers
  • Subprocessor list maintained and updated — 30-day notice for changes

Security Operations

  • Security incident response policy with 72-hour breach notification (GDPR-aligned)
  • Regular penetration testing by third-party security firms
  • Vulnerability disclosure program — report@evaplus.ai
  • Annual security training for all engineering staff
  • Dependencies audited for CVEs — automated alerts via Dependabot
For our full sub-processor list, see /legal/sub-processors. For privacy inquiries: privacy@evaplus.ai.