Security

Security Isn't a Feature—It's the Foundation

OBSIDIAN iD is built with security-first architecture, enterprise-grade encryption, and continuous monitoring.

Infrastructure

Security Measures

Encryption

AES-256 encryption at rest, TLS 1.3 in transit. Zero-knowledge architecture options available for maximum privacy.

Key Management

Hardware security modules (HSM) for key storage. Automatic key rotation and cryptographic separation per tenant.

Network Security

DDoS protection, WAF, private VPC networking. IP whitelisting and geographic restrictions available.

Compliance

SOC 2 Type II certified. GDPR, HIPAA, and CCPA compliant. Regular third-party security audits.

Threat Detection

ML-powered anomaly detection. Real-time monitoring and automated incident response. 24/7 security operations center.

Access Control

Role-based access control. Multi-factor authentication required for all accounts. Session management and device tracking.

Compliance

Certifications & Standards

SOC 2 Type II
GDPR
HIPAA
ISO 27001

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly to our security team.

Security Contact

security@obsidianid.com

Report Vulnerability