Hosting posture
Hosted on cloud infrastructure selected for reliability, auditability, and African-region deployment options.
A practical review of ASIRI security, data handling, access control, incident response, and evidence boundaries for procurement and security teams.

The Trust Assurance Pack is evidence-backed readiness material for buyer, counsel, auditor, DPCO, and QSA review. It is not a certificate, attestation, or regulator approval, and it should not be presented as an external compliance outcome.
View Trust Assurance PackHosting, tenancy, encryption, access control, logging, backup, and incident-response posture for security review.
NDPA workflow ownership, DSR handling, retention, breach support, and transfer-safeguard documentation.
Vendor purpose, region, Customer Data exposure boundary, review cadence, and change-notice process.
Source-linked, human-reviewed decision-support boundaries; not legal advice or a regulator decision.
Payment processor responsibility split and raw-cardholder-data handling restrictions for scoped review.
ISO 27001 and SOC 2 readiness status, evidence owners, open gaps, and external validation boundaries.
Hosted on cloud infrastructure selected for reliability, auditability, and African-region deployment options.
TLS in transit and encrypted storage at rest for tenant data and uploaded evidence.
Role-based access, tenant membership, SSO/SCIM surfaces, MFA support, and audit-linked staff actions.
Tenant-scoped data access, server-side active tenant checks, and audit visibility across sensitive operations.
Subprocessor posture, DPA workflows, and buyer-facing disclosure through trust and policy surfaces.
Incident handling aligned to privacy obligations, breach workflow evidence, and post-incident review.
Access review, personnel readiness, offboarding, and workforce compliance surfaces in the product.
Evidence freshness, exports, reports, auditor workspace, and Trust Center publication patterns.



Yes. Start with the product tour, Trust Center demo, and this procurement posture page. Deep architecture and implementation review happen in guided procurement sessions.
No. ASIRI supports readiness and evidence workflows. Independent certifications remain issued by qualified auditors or certification bodies.
Publicly, ASIRI frames this as regulatory and evidence intelligence. Outputs remain source-linked, reviewable, and subject to human approval before external use.
Yes. Security packs, DPAs, architecture notes, and customer-specific evidence are shared through controlled procurement and Trust Center workflows.