Evose
Why Evose

Security & Compliance Overview

6-layer defense · Data isolation and encryption · MLPS / GDPR / ISO 27001

This page is a security summary from the decision-maker's perspective. For technical detail, see Deploy · Defense in Depth.

6-Layer Defense at a Glance

┌──────────────────────────────────────────────┐
│  Layer 6 · Compliance  MLPS · GDPR · ISO 27001 │
├──────────────────────────────────────────────┤
│  Layer 5 · Audit       Tamper-proof logs       │
├──────────────────────────────────────────────┤
│  Layer 4 · Data        At-rest · field-level   │
├──────────────────────────────────────────────┤
│  Layer 3 · Access      RBAC + ACL              │
├──────────────────────────────────────────────┤
│  Layer 2 · Auth        SSO + email + strong PW │
├──────────────────────────────────────────────┤
│  Layer 1 · Network     HTTPS / TLS · DDoS      │
└──────────────────────────────────────────────┘

What Each Layer Does

LayerImplementationOwner
NetworkEnd-to-end HTTPS / TLS 1.3 · DDoS protection · IP allowlist (optional)SaaS: Evose · Private: Customer
AuthSSO (LDAP / AD / OAuth) · Email login · Strong password policyShared
AccessRBAC (role) + ACL (resource) + workspace isolation + least privilegeConfigured by customer admin
DataAES-256 at rest · field-level credential encryption · workspace logical isolation (SaaS) / physical isolation (Private)SaaS: Evose · Private: Customer
AuditFull operation logs · tamper-proof · long retention · external SIEM integrationProvided by Evose
ComplianceMapped to MLPS · GDPR · ISO 27001 control familiesShared

Data Ownership

DeploymentWhere data livesWho can access
SaaSEvose platform, logical isolation + AES-256Only your organization's members + necessary Evose ops staff (under NDA)
PrivateCustomer's own infrastructureOnly the customer's own personnel; Evose has no access to data

Credential Management

API keys, third-party account passwords, OAuth tokens, and other sensitive credentials:

  • Field-level encrypted storage
  • Visibility controlled by two-layer RBAC + ACL
  • Every use enters the audit log
  • Rotation and revocation supported

Credential Management

Compliance Support

MLPS (China's Multi-Level Protection Scheme)

Supports MLPS Level 2 and Level 3 requirements: identity authentication, access control, security audit, data integrity, and data confidentiality.

GDPR (EU General Data Protection Regulation)

  • Data subject rights: access / rectification / erasure / portability
  • Records of processing: full audit trail
  • Data minimization: workspace isolation + field-level permissions
  • Data localization: private deployment can specify the data center

ISO 27001 (Information Security Management)

Control families covered: access control, cryptography, operations security, communications security, change management.

Full Compliance Checklist

Penetration Testing & Vulnerability Response

  • Third-party penetration testing: at least annually
  • Vulnerability disclosure: report privately via security@evose.ai
  • Response SLA: Critical 24h · High 72h · Medium 7d

Whose Compliance Requirements Fit

IndustryDeployments we've seenKey compliance
FinancePrivateMLPS Level 3 · Data localization
HealthcarePrivateMLPS Level 3 · GDPR (cross-border) · HIPAA (U.S.)
ManufacturingBothISO 27001 · Trade secret protection
Government & SOEsPrivateMLPS Level 3 and above
InternetSaaSGDPR · ISO 27001

Next Steps