Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.emergence.ai/llms.txt

Use this file to discover all available pages before exploring further.

SOC 2 Controls Mapping

This page maps CRAFT’s security controls to the SOC 2 Trust Service Criteria (TSC) 2017 (revised 2022) defined by the AICPA. CRAFT is the core platform powering the Emergence product suite. The mapping covers all five trust service categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy.
This mapping documents the platform’s built-in controls. Organizations pursuing SOC 2 Type II certification must also implement organizational controls (policies, procedures, training) and engage a qualified auditor.

Security (Common Criteria)

Security controls form the foundation of all SOC 2 categories.

CC6: Logical and Physical Access Controls

CriteriaControlPlatform Implementation
CC6.1Logical access securityKeycloak multi-realm JWT authentication with OIDC/PKCE
CC6.2User registration and authorizationOpenFGA ReBAC with role-based permissions (owner, admin, member, developer, operator, viewer)
CC6.3Access removalKeycloak user deactivation + OpenFGA relation cleanup; SCIM 2.0 deprovisioning from IdP
CC6.6Boundary protectionKubernetes NetworkPolicies, ingress TLS termination, SSRF protection
CC6.7Data transmission protectionTLS 1.3 for external traffic, TLS 1.2 minimum for internal (due to managed service compatibility — Cloud SQL, Redis, Keycloak). mTLS available via service mesh (Istio, Linkerd)
CC6.8Unauthorized software preventionContainer-based deployment, immutable images, no SSH access to pods

CC7: System Operations

CriteriaControlPlatform Implementation
CC7.1Detection of vulnerabilitiesContainer image scanning in CI/CD, dependency pinning with ==
CC7.2Anomaly detectionOpenTelemetry traces/metrics/logs with Grafana LGTM alerting
CC7.3Security incident evaluationImmutable audit logs with SIEM integration via OpenTelemetry Collector (customer-configurable exporters)
CC7.4Incident responseAudit trail with trace_id correlation for investigation; configurable alerting thresholds for detection. Organizations must maintain a documented IR plan with roles and escalation paths

CC8: Change Management

CriteriaControlPlatform Implementation
CC8.1Change authorizationGitHub PR reviews, changeset-based versioning, CI/CD gates
CC8.2Infrastructure changesTerraform IaC with plan/apply workflow, ArgoCD GitOps
CC8.3Configuration managementHelm values files, immutable Alembic migrations, version-driven builds

Availability

CriteriaControlPlatform Implementation
A1.1Processing capacityKubernetes autoscaling (GKE Autopilot, HPA), Redis connection pooling
A1.2Recovery from disruptionsMulti-database backup strategy, point-in-time recovery, disaster recovery checklist
A1.3Environmental protectionsCloud provider infrastructure (GKE, EKS, AKS) with multi-zone availability

Backup and Recovery Controls

ControlImplementation
Automated backupsCloud-managed daily backups with configurable retention (30 days default)
Point-in-time recoveryWAL archiving for PostgreSQL PITR
Backup testingRegular restore validation as part of DR procedures (frequency defined in organization DR plan)
Startup orderDocumented service dependency DAG for orderly recovery

Processing Integrity

CriteriaControlPlatform Implementation
PI1.1Processing accuracySQLAlchemy ORM with strict typing, Pydantic request/response validation
PI1.2Input validationFastAPI automatic request validation, search query injection prevention
PI1.3Processing monitoringPrefect workflow orchestration with status tracking, health check monitoring
PI1.4Output completenessAuto-generated SDKs ensure API contract compliance, E2E test coverage

Data Integrity Controls

ControlImplementation
Schema enforcementSQLAlchemy 2.0+ with strict type annotations, Alembic migration validation
API contract testingAuto-generated Python/TypeScript SDKs from OpenAPI specs, E2E tests via generated SDKs
Query safetyplainto_tsquery() for user input, parameterized queries, no string interpolation
Webhook integrityHMAC-SHA256 signed payloads with unique delivery IDs (planned — not yet released)

Confidentiality

CriteriaControlPlatform Implementation
C1.1Confidential information identificationFour-level data classification (Public, Internal, Confidential, Restricted). Query result sensitivity inherits from the underlying data source; organizations must classify their data connections appropriately
C1.2Confidential information disposalCrypto-shredding for RTBF, configurable retention policies, backup rotation
Query result sensitivity inherits from the underlying data source. Healthcare data may be Restricted, while business analytics may be Confidential. Organizations must classify their data connections appropriately. See Data Classification for the full taxonomy.

Encryption Controls

ControlImplementation
Encryption at restAES-256 via cloud-managed encryption, CMEK support
Encryption in transitTLS 1.3 (external), TLS 1.2 minimum (internal). mTLS available via service mesh
Key managementCloud KMS or provider-managed keys, per-principal keys for audit PII
Secrets managementPlatform Secrets API (Infisical or ESO + GCP Secret Manager), never stored in code or config

Privacy

CriteriaControlPlatform Implementation
P1.1Privacy noticeData processing purposes documented per data connection
P2.1Choice and consentConfigurable per-tenant data processing settings
P3.1Personal information collectionMinimal PII collection (email, IP for audit); data minimization applied
P4.1Use, retention, and disposalConfigurable retention per data type, automated cleanup
P5.1Access to personal informationAudit log export, data portability APIs (JSON/CSV)
P6.1Disclosure to third partiesNo user data shared by default. LLM-powered features (when enabled) send user queries and schema context to the configured LLM provider; DPA/BAA required. Cloud provider DPAs for managed services. Self-hosted LLM option eliminates third-party data transfer
P7.1Quality of personal informationUser profile sync via SCIM, Keycloak-managed identity
P8.1Complaints handlingAdmin audit trail for RTBF request tracking

Access Review Controls

The platform supports periodic access reviews for SOC 2 compliance:
Administrators can review all RBAC grants per tenant using the Governance API. The review includes role assignments, last login timestamps, and permission inheritance paths.
Automated detection of agent registrations whose publisher account has been deactivated. Orphaned resources are flagged for review or ownership transfer.
Entities with no updates and consecutive failing health checks for a configurable number of days are flagged for review. Stale entities may indicate abandoned resources or decommissioned services.
When users are deactivated in the enterprise IdP, SCIM 2.0 sync automatically removes their Keycloak realm access and cleans up OpenFGA relations.

Evidence Collection

For SOC 2 audit evidence, the platform provides:
EvidenceSourceExport Format
Access logsAudit log APIJSON, CSV
Change historyGit commits, ArgoCD sync historyGit log, API
Configuration stateHelm values, Terraform stateYAML, JSON
Vulnerability scansCI/CD pipeline artifactsSARIF, JSON
Backup verificationCloud provider backup logsProvider-specific
Incident recordsAlert history, trace correlationJSON

Next Steps

GDPR Compliance

Learn about GDPR-specific controls and Right to Be Forgotten.

HIPAA Compliance

Review HIPAA compliance considerations for healthcare deployments.

Authentication

Deep dive into the authentication architecture.

Data Classification

Review data classification levels and encryption standards.