Skip to main content
ARCNAT
SolutionsHow It WorksComplianceDocsSecurityContact
Sign inSign upDashboardGet Started
ARCNATARCNAT

Legal & Privacy

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Security

Product

  • Solutions
  • Compliance
  • Architecture Overview
  • API Documentation

Resources

  • Documentation
  • Production Readiness
  • Pricing
  • Live Demo

Contact

  • Request Architecture Brief
  • Support

ARCNAT: The First Autonomous TPA Operating System

80+ intelligent agents across 20 waves. 8 interoperability protocols. Evidence-sealed compliance testing, EPCRS corrections, and government filings. Built for firms that carry fiduciary responsibility.

Privacy•Terms•Cookies

© 2026 ARC-OS. All rights reserved.

Enterprise-Grade Security

Agent Governance & Zero-Trust Security

Multi-tenant agent isolation, cryptographic evidence sealing, and fiduciary boundary enforcement. Every agent action is permissioned and auditable. Zero-trust architecture across 80+ agents with fiduciary boundary enforcement.

Production ReadinessRequest Security Brief

Comprehensive Security Architecture

Defense-in-depth security controls designed for regulated environments. Zero-trust principles with AI-powered threat detection.

Authentication & Identity

Modern auth primitives with tenant scoping, MCP-layer permissioning for all agent requests, and zero-trust verification
JWT (Jose)OAuth2/SSOSAML SSOMFA ReadyIP Controlsbcrypt (12 rounds)

Server routes derive tenant/user context from Authorization headers with cryptographically secure token validation. Tenant scoping is enforced at the query layer with Row-Level Security (RLS) and zero-trust principles. Supports Google, Microsoft, Okta, and generic OAuth providers.

Multi-tenant isolation with RLS
Session management with configurable expiration

Authorization & Policy

Defense-in-depth access control with RBAC, ABAC, and fiduciary boundary enforcement — every agent action that constitutes a fiduciary act is pre-authorized against the plan's fiduciary authority matrix
RBACABACPolicy EngineAudit TrailsApprovals

Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) enforced at GraphQL and API levels. Approval decisions are captured and broadcast via an outbox event stream for traceability and deterministic replay.

Policy gates with tier enforcement
Complete decision audit trail
View Approvals Console

Data Protection

Encryption, retention, redaction, and multi-tenant agent isolation — no agent can access cross-tenant data
AES-256-GCMTLS/HTTPSRetention PoliciesLegal HoldsSubject AccessField-Level Encryption

Data encrypted at rest (AES-256-GCM) and in transit (TLS/HTTPS). Governance schemas support classification, retention rules, legal holds, export logging, and redaction decisions with automated enforcement.

GDPR, CCPA, and HIPAA compliant
Secure token generation (cryptographically secure)

Threat Detection & Monitoring

System Health Agent monitors all 80+ agents across 5 tiers; AI-powered threat detection and zero-trust verification
AI Threat DetectionBehavioral AnalysisZero-TrustIP ReputationBrute Force DetectionAnomaly Detection

AI-powered threat detection with behavioral biometrics, fraud pattern recognition, and real-time threat scoring. Zero-trust verification for every request with adaptive risk thresholds and automatic IP blocking.

Real-time threat scoring and risk assessment
DDoS mitigation with rate limiting and IP blocking

Agent Governance

Agent-level RBAC, OASF capability boundaries, ANP cross-tenant isolation, and Evidence Sealing Agent for tamper-evident audit trails

Every agent is governed by role-based access and capability boundaries (OASF). ANP enforces cross-tenant isolation so no agent can access data outside its tenant. The Evidence Sealing Agent produces tamper-evident audit trails for all agent actions.

Agent-level RBAC and OASF capability boundaries
ANP cross-tenant isolation
Evidence Sealing Agent for tamper-evident audit trails

Operational Security

Observability and evidence-first operations
Structured EventsEvidence BundlesExport ControlsAudit Trails

The platform is designed around provable execution with evidence bundles and event trails to support audits and litigation readiness. Cryptographic sealing with SHA-256 hashing and KMS signing.

Immutable event logs with full replay capability
Court-grade evidence artifacts
View Events & Trace

Security Standards & Compliance

Built on industry-leading security frameworks and best practices. Production-ready with comprehensive compliance controls.

OWASP Top 10 Protection

Comprehensive protection against all OWASP Top 10 vulnerabilities: Broken Access Control, Cryptographic Failures, Injection, Insecure Design, Security Misconfiguration, Vulnerable Components, Authentication Failures, Software & Data Integrity, Logging & Monitoring, and SSRF.

End-to-End Encryption

AES-256-GCM encryption at rest, TLS/HTTPS in transit, field-level encryption for sensitive data, and secure token generation with cryptographically secure algorithms.

Full Audit Trails

Immutable event logs with complete traceability, deterministic replay, evidence bundles with cryptographic sealing, and comprehensive compliance logging.

Zero-Trust Architecture

Every access request verified with risk scoring, IP reputation checking, behavioral analysis, and adaptive thresholds. No implicit trust assumptions.

Real-Time Monitoring

AI-powered threat detection, behavioral anomaly detection, real-time security event tracking, and comprehensive observability with structured logging and metrics.

Compliance Ready

GDPR, CCPA, HIPAA compliance with data protection controls, retention policies, subject access rights, and audit capabilities. SOC 2 and ISO 27001 ready.

Security Headers

HSTS with preload, strict Content Security Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Referrer-Policy, and Permissions-Policy headers.

Input Validation

Comprehensive sanitization, SQL injection protection via parameterized queries, XSS protection with CSP and input sanitization, CSRF protection, and injection detection (SQL, NoSQL, command, LDAP, XPath).

Secrets Management

Secure environment variable storage, encrypted secret storage in database, secure secret retrieval with decryption, and access control for secrets.

Why Security Matters

In regulated environments, security is not a feature—it's a foundation

ERISA Data Protection

ERISA mandates plan administrators maintain records sufficient to support filings and audit responses for a minimum of 6 years. ARCNAT enforces plan-type-specific retention policies, legal hold overrides that prevent any deletion until the hold is lifted, and field-level encryption for sensitive participant data (SSNs, dates of birth, beneficiary information) with access logging.

AI Model Governance

Every AI agent decision that affects plan data, compliance determinations, or participant accounts is logged with reasoning, confidence score, and input/output. Decisions below confidence thresholds require human review. The Model Governance module monitors drift, calibration, and accuracy over time — quarantining underperforming models until reviewed.

Data Retention & Legal Hold

Configurable retention policies per data type: plan records (7 years post-termination minimum), participant records (retained until all potential claims extinguished), evidence bundles (7 years minimum), billing records (7 years). Legal holds override retention — flagging all associated data for indefinite retention. Hold lifting requires explicit approval with audit trail.

Complete Transparency

Full observability into all security events. No black boxes. Every access attempt, policy decision, and data operation is visible and auditable. Deterministic replay proves system integrity to any examiner.

Business Continuity & Disaster Recovery

RPO <5 minutes via synchronous event ledger replication. RTO <1 hour via pre-warmed standby infrastructure. Evidence bundle triple redundancy across three geographically separate locations. 72-hour breach notification. Post-incident reports sealed as evidence artifacts. Tiered availability: 99.99% for critical data paths, 99.9% for operational services.

SOC 2 Attestation & Vendor Risk Management

SOC 2 Type I/II roadmap covering all five Trust Services Criteria. Annual external penetration testing with 30-day critical finding remediation SLA. Three-tier encryption key hierarchy with HSM and BYOK option. Code escrow with defined release triggers. Full data portability in open schema at no charge. Quarterly access reviews for all accounts and API keys.

Ready to learn more?

Review our comprehensive production readiness documentation covering all security controls, compliance measures, threat detection capabilities, and operational security features.

Production ReadinessContact Security Team

Compliance · Architecture docs · Production Readiness