Compliance & Certifications

Security certified.
Sovereignty preserved.

VEILWATCH platforms are built against international security and operational standards, and deployed within regulatory frameworks that preserve government data sovereignty. Every deployment maps to ISO 27001, SOC 2, and applicable government-specific security standards — continuously verified by VSIM.

Security Standards

Certifications that matter to sovereign governments.

VEILWATCH platforms are architected against internationally recognised security frameworks, with continuous gap reporting automated by VSIM.

ISO 27001

Information security management system standard. VEILWATCH platforms designed around ISO 27001 controls, with VSIM continuous compliance verification.

SOC 2

Service Organisation Control 2 for security, availability, and confidentiality. VEILWATCH operations verified against SOC 2 trust service criteria.

AES-256

All data at rest encrypted with AES-256. All data in motion encrypted via TLS 1.3 or encrypted network with mutual certificate authentication.

ICAO 9303

Full compliance with ICAO Doc 9303 for travel documents — TD1 (ID cards), TD2, TD3 (passports) across all issuing states.

ISO 18013-5

Full compliance with the mobile driver's licence standard — international interoperability for Digital Identity mDL.

FATF Frameworks

AML / KYC, Blacklist and Greylist risk management, Travel Rule compliance for crypto — built into NEXUS and Regulatory Intelligence.

Regulatory Frameworks

Continuous mapping to regulatory requirements.

VSIM automates the mapping of network access controls, data handling, and operational procedures against applicable compliance frameworks — with continuous gap reporting and remediation briefing.

UNSC Compliance

UNSC, UN Resolution 1267 (Counter-Terrorism), UN Resolution 1988 (Taliban), UN CRS built into NEXUS screening and SENTINEL risk scoring.

Sanctions Regimes

Real-time screening against OFAC, UN, EU, and all major regional sanctions lists — including crypto sanctions (OFAC SDN addresses).

Government-Specific

Deployments mapped to each customer government's specific security standards — continuous gap reporting and remediation guidance.

Confidential Compute

Hardware-level confidential-compute attestation across every supported public-cloud tier — for the highest-assurance government workloads.

Detailed compliance briefings available.

Request a classified technical briefing covering the specific standards and frameworks applicable to your jurisdiction and deployment.

Request a briefing