Certifications and audits
SOC 2 Type II audit is in progress, with completion targeted for H1 2026. Questionnaires, letters of engagement, and scope documents are available to qualified customers under NDA.
Armeta processes proprietary engineering drawings — P&IDs, plot plans, and related as-built documentation — for operators, EPCs, and engineering firms. That data is sensitive by nature: it describes the facility, the equipment, and often the safety envelope. Our security program is designed around that reality.
Every commitment on this page is verifiable. Customers and prospects evaluating Armeta can request current documentation, subprocessor lists, and architecture summaries from the security team under NDA.
SOC 2 Type II audit is in progress, with completion targeted for H1 2026. Questionnaires, letters of engagement, and scope documents are available to qualified customers under NDA.
TLS 1.3 for all data in transit. AES-256 for all data at rest. Cryptographic material is managed by a dedicated key management service with rotation enforced on a fixed schedule.
Single sign-on via SAML 2.0 and OIDC. Role-based access control aligned to customer directory groups. Full audit logs for authentication, authorization, and data access events, exportable to customer SIEM.
US, EU, and customer-designated regions supported. Customer engineering data is stored in the region selected at onboarding and is not replicated across regions without explicit authorization.
Multi-tenant cloud, dedicated single-tenant cloud, and on-premise or customer-managed private cloud. Air-gapped deployments are supported for engagements that require them.
24x7 on-call rotation. Documented severity classification, communication SLAs, and post-incident review process. Customer-impacting incidents are reported in line with the terms of the engagement.
Specific customer data handling terms — including access, retention, deletion, and regional constraints — are defined in each customer's master services agreement and data processing addendum. The defaults documented here are the minimum; individual engagements can tighten them but not relax them.
For audit-facing customers, Armeta supports read-only auditor access to extraction outputs, traceability records, and provenance metadata as part of the engagement scope.
For questionnaires, vulnerability reports, or a copy of the current security overview, write to security@armeta.ai. Responses within one business day.
No. Customer engineering data is never used to train or fine-tune Armeta’s shared models. Engagement-specific models trained on a customer’s own data remain scoped to that engagement and are not exposed to other customers.
Logical segregation at every layer — storage, compute, and processing — keyed to the customer tenant. Single-tenant and on-premise deployments provide physical segregation in addition to logical controls.
Retention, deletion, and return-of-data are governed by the terms of the engagement. The default posture is that customer data is deleted on request and on contract termination, subject to documented legal-hold requirements.
Security questionnaires, architecture summaries, and subprocessor lists are available to qualified customers and prospects under NDA. Contact security@armeta.ai to request access.
Write to security@armeta.ai with as much detail as you can share. We acknowledge vulnerability reports within one business day and coordinate disclosure in good faith.