SOC 2 Type II
Certified
Annual third-party audit coverage.
Security & trust
Thoth is built for regulated infrastructure. Decisions are auditable and explainable at the moment of action, not days later in incident review.
Runtime compliance
Static posture reports show policy intent. AIRS enforcement shows policy execution.
SOC 2 Type II
Certified
Annual third-party audit coverage.
EU AI Act (Article 12)
Ready
Traceability of functioning is covered through runtime evidence and WORM records.
ISO 42001
Certified
AI management system controls in active operation.
HIPAA
Compliant
BAA available with PHI-handling controls in policy enforcement.
NIST AI RMF
Aligned
Behavioral baselines are mapped to risk management functions.
AIRS standard
The post-approval gap starts after IAM and OAuth grant access. Thoth enforces at the moment of action.
Static posture
Sees configuration state and control coverage. Cannot stop a live agent action.
Runtime enforcement (AIRS)
Evaluates intent, context, and policy on each tool call, then allows, steps up, or blocks it.
Every decision is written to a cryptographically linked chain. Insertion, deletion, or tampering is detectable.
If the enforcer path fails, actions default to BLOCK for protected workflows.
Thoth does not store API keys or OAuth tokens. It evaluates metadata, context, and intent at runtime.
Enterprise tenants run with isolated VPC, compute, and KMS boundaries.
Data governance & privacy
Customer telemetry is encrypted with customer-managed keys (CMK) in AWS KMS.
What we process
What we never process
Vetting & disclosure
Start in shadow mode with no workflow disruption, then enforce where control is required.