Security & Trust Center

Built for
Enterprise Assurance

Security is not a feature at Crafted—it’s the platform. We protect your data, govern model behavior, and provide deployment options that satisfy strict enterprise requirements.

SOC 2 Type IIGDPR AlignedHIPAA Ready99.99% SLA

Data Protection

TLS 1.3 in transit and AES-256 at rest with strict tenant isolation. Your data is never used to train public models.

Identity & Access

SSO (SAML/OIDC), RBAC, and MFA enforced for privileged roles with audit-ready access logs.

Infrastructure Security

Isolated environments with continuous monitoring, anomaly detection, and hardened network policies.

Compliance Ready

SOC 2 Type II, GDPR aligned, HIPAA-ready deployments, and ISO 27001-aligned controls.

Data Flow

Clear boundaries and traceable steps across ingestion, processing, and outputs.

Your Systems

  • CRM, ticketing, and internal tools
  • Knowledge bases and private data
  • API sources and event streams

Crafted Orchestration

  • Context routing and policy checks
  • Tool execution with guardrails
  • Encrypted logs and audit trails

Outputs

  • Approved actions and responses
  • Structured records and artifacts
  • Human-in-the-loop escalation

Model Governance

Governance is built into the platform with model approval workflows, evaluation pipelines, and continuous monitoring to enforce policy and safety requirements.

Model registry with approval and version control.
Eval suites with drift detection and regression alerts.
Policy enforcement for PII, redaction, and access scope.
Red‑team tests and incident response playbooks.

Governance Controls

Prompt and tool usage policies with enforcement logs.
Model allowlists and environment-specific approvals.
Role-based access with approval workflows for changes.

Deployment Modes

Choose the deployment model that fits your risk posture and compliance requirements.

Private VPC

Isolated networking with private endpoints, VPC peering, and dedicated clusters.

On‑Prem

Run Crafted in your environment with full control over data residency and access.

Hybrid

Split processing between private and cloud environments with policy controls.

Trust Center Access

Request SOC 2 reports, security questionnaires, and deployment architecture reviews. Vulnerability disclosures are handled through our security response team.